Item Search

NameAudit NamePluginCategory
Big Sur - Configure the System to Protect Memory from Unauthorized Code ExecutionNIST macOS Big Sur v1.4.0 - 800-53r4 HighUnix

SYSTEM AND INFORMATION INTEGRITY

Big Sur - Configure the System to Protect Memory from Unauthorized Code ExecutionNIST macOS Big Sur v1.4.0 - 800-53r5 ModerateUnix

SYSTEM AND INFORMATION INTEGRITY

Big Sur - Configure the System to Protect Memory from Unauthorized Code ExecutionNIST macOS Big Sur v1.4.0 - All ProfilesUnix

SYSTEM AND INFORMATION INTEGRITY

Big Sur - Configure the System to Protect Memory from Unauthorized Code ExecutionNIST macOS Big Sur v1.4.0 - 800-53r4 ModerateUnix

SYSTEM AND INFORMATION INTEGRITY

Big Sur - Configure the System to Protect Memory from Unauthorized Code ExecutionNIST macOS Big Sur v1.4.0 - 800-53r5 HighUnix

SYSTEM AND INFORMATION INTEGRITY

Big Sur - Configure the System to Protect Memory from Unauthorized Code ExecutionNIST macOS Big Sur v1.4.0 - CNSSI 1253Unix

SYSTEM AND INFORMATION INTEGRITY

Catalina - Configure the System to Protect Memory from Unauthorized Code ExecutionNIST macOS Catalina v1.5.0 - 800-53r4 HighUnix

SYSTEM AND INFORMATION INTEGRITY

Catalina - Configure the System to Protect Memory from Unauthorized Code ExecutionNIST macOS Catalina v1.5.0 - 800-53r5 HighUnix

SYSTEM AND INFORMATION INTEGRITY

Catalina - Configure the System to Protect Memory from Unauthorized Code ExecutionNIST macOS Catalina v1.5.0 - 800-53r5 ModerateUnix

SYSTEM AND INFORMATION INTEGRITY

Catalina - Configure the System to Protect Memory from Unauthorized Code ExecutionNIST macOS Catalina v1.5.0 - 800-53r4 ModerateUnix

SYSTEM AND INFORMATION INTEGRITY

Catalina - Configure the System to Protect Memory from Unauthorized Code ExecutionNIST macOS Catalina v1.5.0 - All ProfilesUnix

SYSTEM AND INFORMATION INTEGRITY

Catalina - Configure the System to Protect Memory from Unauthorized Code ExecutionNIST macOS Catalina v1.5.0 - CNSSI 1253Unix

SYSTEM AND INFORMATION INTEGRITY

Monterey - Configure the System to Protect Memory from Unauthorized Code ExecutionNIST macOS Monterey v1.0.0 - 800-53r4 ModerateUnix

SYSTEM AND INFORMATION INTEGRITY

Monterey - Configure the System to Protect Memory from Unauthorized Code ExecutionNIST macOS Monterey v1.0.0 - All ProfilesUnix

SYSTEM AND INFORMATION INTEGRITY

Monterey - Configure the System to Protect Memory from Unauthorized Code ExecutionNIST macOS Monterey v1.0.0 - 800-53r5 HighUnix

SYSTEM AND INFORMATION INTEGRITY

Monterey - Configure the System to Protect Memory from Unauthorized Code ExecutionNIST macOS Monterey v1.0.0 - 800-53r4 HighUnix

SYSTEM AND INFORMATION INTEGRITY

Monterey - Configure the System to Protect Memory from Unauthorized Code ExecutionNIST macOS Monterey v1.0.0 - 800-53r5 ModerateUnix

SYSTEM AND INFORMATION INTEGRITY

Monterey - Configure the System to Protect Memory from Unauthorized Code ExecutionNIST macOS Monterey v1.0.0 - CNSSI 1253Unix

SYSTEM AND INFORMATION INTEGRITY

OL08-00-010420 - OL 8 must implement non-executable data to protect its memory from unauthorized code execution - /proc/cpuinfoDISA Oracle Linux 8 STIG v1r2Unix
OL08-00-010420 - OL 8 must implement non-executable data to protect its memory from unauthorized code execution.DISA Oracle Linux 8 STIG v1r8Unix
OL08-00-010430 - OL 8 must implement address space layout randomization (ASLR) to protect its memory from unauthorized code execution - ASLR to protect its memory from unauthorized code executionDISA Oracle Linux 8 STIG v1r8Unix
OL08-00-010430 - OL 8 must implement address space layout randomization (ASLR) to protect its memory from unauthorized code execution - conf filesDISA Oracle Linux 8 STIG v1r4Unix
OL08-00-010430 - OL 8 must implement address space layout randomization (ASLR) to protect its memory from unauthorized code execution - sysctlDISA Oracle Linux 8 STIG v1r4Unix
OL08-00-010430 - OL 8 must implement address space layout randomization (ASLR) to protect its memory from unauthorized code execution.DISA Oracle Linux 8 STIG v1r10Unix
RHEL-08-010420 - RHEL 8 must implement non-executable data to protect its memory from unauthorized code execution - /proc/cpuinfoDISA Red Hat Enterprise Linux 8 STIG v1r3Unix
RHEL-08-010420 - RHEL 8 must implement non-executable data to protect its memory from unauthorized code execution - dmesg NXDISA Red Hat Enterprise Linux 8 STIG v1r6Unix
RHEL-08-010420 - RHEL 8 must implement non-executable data to protect its memory from unauthorized code execution - dmesg NXDISA Red Hat Enterprise Linux 8 STIG v1r3Unix
RHEL-08-010430 - RHEL 8 must implement address space layout randomization (ASLR) to protect its memory from unauthorized code execution - conf filesDISA Red Hat Enterprise Linux 8 STIG v1r9Unix
RHEL-08-010430 - RHEL 8 must implement address space layout randomization (ASLR) to protect its memory from unauthorized code execution - conf filesDISA Red Hat Enterprise Linux 8 STIG v1r8Unix
RHEL-08-010430 - RHEL 8 must implement address space layout randomization (ASLR) to protect its memory from unauthorized code execution - sysctlDISA Red Hat Enterprise Linux 8 STIG v1r9Unix
RHEL-08-010430 - RHEL 8 must implement address space layout randomization (ASLR) to protect its memory from unauthorized code execution - sysctlDISA Red Hat Enterprise Linux 8 STIG v1r6Unix
RHEL-08-010430 - RHEL 8 must implement address space layout randomization (ASLR) to protect its memory from unauthorized code execution.DISA Red Hat Enterprise Linux 8 STIG v1r13Unix
RHEL-08-010430 - RHEL 8 must implement address space layout randomization (ASLR) to protect its memory from unauthorized code execution. - 99-*.confDISA Red Hat Enterprise Linux 8 STIG v1r5Unix
RHEL-09-213110 - RHEL 9 must implement nonexecutable data to protect its memory from unauthorized code execution.DISA Red Hat Enterprise Linux 9 STIG v1r2Unix
SLES-15-010540 - The SUSE operating system must implement kptr-restrict to prevent the leaking of internal kernel addresses.DISA SLES 15 STIG v1r6Unix
SLES-15-010550 - Address space layout randomization (ASLR) must be implemented by the SUSE operating system to protect memory from unauthorized code execution.DISA SLES 15 STIG v1r10Unix
SLES-15-010550 - Address space layout randomization (ASLR) must be implemented by the SUSE operating system to protect memory from unauthorized code execution.DISA SLES 15 STIG v1r6Unix
UBTU-20-010447 - The Ubuntu operating system must implement non-executable data to protect its memory from unauthorized code execution.DISA STIG Ubuntu 20.04 LTS v1r4Unix
UBTU-20-010447 - The Ubuntu operating system must implement nonexecutable data to protect its memory from unauthorized code execution.DISA STIG Ubuntu 20.04 LTS v1r9Unix
UBTU-20-010448 - The Ubuntu operating system must implement address space layout randomization to protect its memory from unauthorized code executionDISA STIG Ubuntu 20.04 LTS v1r9Unix
UBTU-20-010448 - The Ubuntu operating system must implement address space layout randomization to protect its memory from unauthorized code execution - procDISA STIG Ubuntu 20.04 LTS v1r4Unix
UBTU-20-010448 - The Ubuntu operating system must implement address space layout randomization to protect its memory from unauthorized code execution - procDISA STIG Ubuntu 20.04 LTS v1r5Unix
UBTU-20-010448 - The Ubuntu operating system must implement address space layout randomization to protect its memory from unauthorized code execution - procDISA STIG Ubuntu 20.04 LTS v1r1Unix
UBTU-20-010448 - The Ubuntu operating system must implement address space layout randomization to protect its memory from unauthorized code execution - sysctlDISA STIG Ubuntu 20.04 LTS v1r1Unix
UBTU-20-010448 - The Ubuntu operating system must implement address space layout randomization to protect its memory from unauthorized code execution.DISA STIG Ubuntu 20.04 LTS v1r9Unix
UBTU-22-213025 - Ubuntu 22.04 LTS must implement nonexecutable data to protect its memory from unauthorized code execution.DISA STIG Canonical Ubuntu 22.04 LTS v2r1Unix
UBTU-22-213025 - Ubuntu 22.04 LTS must implement nonexecutable data to protect its memory from unauthorized code execution.DISA STIG Canonical Ubuntu 22.04 LTS v1r1Unix
WN11-00-000145 - Data Execution Prevention (DEP) must be configured to at least OptOut.DISA Windows 11 STIG v1r6Windows
WN11-00-000150 - Structured Exception Handling Overwrite Protection (SEHOP) must be enabled.DISA Windows 11 STIG v1r2Windows
WN11-CC-000215 - Explorer Data Execution Prevention must be enabled.DISA Windows 11 STIG v1r2Windows