Item Search

NameAudit NamePluginCategory
AMLS-L3-000210 - The Arista Multilayer Switch must enforce information flow control using explicit security attributes (for example, IP addresses, port numbers, protocol, Autonomous System, or interface) on information, source, and destination objects.DISA STIG Arista MLS DCS-7000 Series RTR v1r4Arista

ACCESS CONTROL, CONFIGURATION MANAGEMENT

AMLS-L3-000220 - The Arista Multilayer Switch must enable neighbor router authentication for control plane protocols except RIP - IS-IS md5 keyDISA STIG Arista MLS DCS-7000 Series RTR v1r4Arista

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Catalina - Control Connections to Other Systems via a Deny-All and Allow-by-Exception Firewall PolicyNIST macOS Catalina v1.5.0 - 800-53r5 ModerateUnix

ACCESS CONTROL, SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

Catalina - Control Connections to Other Systems via a Deny-All and Allow-by-Exception Firewall PolicyNIST macOS Catalina v1.5.0 - 800-53r4 HighUnix

ACCESS CONTROL, SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

Catalina - Control Connections to Other Systems via a Deny-All and Allow-by-Exception Firewall PolicyNIST macOS Catalina v1.5.0 - 800-53r4 ModerateUnix

ACCESS CONTROL, SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

Catalina - Control Connections to Other Systems via a Deny-All and Allow-by-Exception Firewall PolicyNIST macOS Catalina v1.5.0 - All ProfilesUnix

ACCESS CONTROL, SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

CISC-ND-000140 - The Cisco router must be configured to enforce approved authorizations for controlling the flow of management information within the device based on control policies.DISA STIG Cisco IOS XE Router NDM v3r1Cisco

ACCESS CONTROL

CISC-ND-000140 - The Cisco switch must be configured to enforce approved authorizations for controlling the flow of management information within the device based on control policies.DISA STIG Cisco NX-OS Switch NDM v3r1Cisco

ACCESS CONTROL

CISC-ND-000140 - The Cisco switch must be configured to enforce approved authorizations for controlling the flow of management information within the device based on control policies.DISA STIG Cisco IOS XE Switch NDM v3r1Cisco

ACCESS CONTROL

CISC-RT-000030 - The Cisco switch must be configured to use keys with a duration not exceeding 180 days for authenticating routing protocol messages.DISA STIG Cisco NX-OS Switch RTR v3r1Cisco

ACCESS CONTROL, CONFIGURATION MANAGEMENT

CISC-RT-000480 - The Cisco BGP switch must be configured to use a unique key for each autonomous system (AS) that it peers with.DISA STIG Cisco NX-OS Switch RTR v3r1Cisco

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN000000-AIX00020 - AIX Trusted Computing Base (TCB) software must be implemented.DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL, SYSTEM AND SERVICES ACQUISITION

GEN000000-SOL00120 - The ASET master files must be located in the /usr/aset/masters directory - tune.highDISA STIG Solaris 10 X86 v2r4Unix

ACCESS CONTROL

GEN000000-SOL00120 - The ASET master files must be located in the /usr/aset/masters directory - tune.highDISA STIG Solaris 10 SPARC v2r4Unix

ACCESS CONTROL

GEN000000-SOL00120 - The ASET master files must be located in the /usr/aset/masters directory - tune.lowDISA STIG Solaris 10 SPARC v2r4Unix

ACCESS CONTROL

GEN000000-SOL00120 - The ASET master files must be located in the /usr/aset/masters directory - tune.lowDISA STIG Solaris 10 X86 v2r4Unix

ACCESS CONTROL

GEN000000-SOL00120 - The ASET master files must be located in the /usr/aset/masters directory - tune.medDISA STIG Solaris 10 X86 v2r4Unix

ACCESS CONTROL

GEN000000-SOL00120 - The ASET master files must be located in the /usr/aset/masters directory - tune.medDISA STIG Solaris 10 SPARC v2r4Unix

ACCESS CONTROL

GEN000000-SOL00120 - The ASET master files must be located in the /usr/aset/masters directory - uid_aliasesDISA STIG Solaris 10 X86 v2r4Unix

ACCESS CONTROL

GEN000000-SOL00120 - The ASET master files must be located in the /usr/aset/masters directory - uid_aliasesDISA STIG Solaris 10 SPARC v2r4Unix

ACCESS CONTROL

GEN000000-SOL00160 - If the system is a firewall, ASET must be used on the system, and the firewall parameters must be set in /usr/aset/asetenv.DISA STIG Solaris 10 X86 v2r4Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN000000-SOL00160 - If the system is a firewall, ASET must be used on the system, and the firewall parameters must be set in /usr/aset/asetenv.DISA STIG Solaris 10 SPARC v2r4Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN000000-SOL00180 - The Solaris system Automated Security Enhancement Tool (ASET) configurable parameters in the asetenv file must be correct - ASET configurable parameters in the asetenv file must be correct.DISA STIG Solaris 10 X86 v2r4Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN000000-SOL00180 - The Solaris system Automated Security Enhancement Tool (ASET) configurable parameters in the asetenv file must be correct - ASET configurable parameters in the asetenv file must be correct.DISA STIG Solaris 10 SPARC v2r4Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN000000-SOL00200 - The asetenv file YPCHECK variable must be set to true when NIS+ is configured.DISA STIG Solaris 10 SPARC v2r4Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN000000-SOL00200 - The asetenv file YPCHECK variable must be set to true when NIS+ is configured.DISA STIG Solaris 10 X86 v2r4Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN000000-SOL00220 - The /usr/aset/userlist file must exist - /usr/aset/userlistDISA STIG Solaris 10 X86 v2r4Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN000000-SOL00220 - The /usr/aset/userlist file must exist - /usr/aset/userlistDISA STIG Solaris 10 SPARC v2r4Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN000000-SOL00220 - The /usr/aset/userlist file must exist - exec with userlistDISA STIG Solaris 10 X86 v2r4Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN000000-SOL00220 - The /usr/aset/userlist file must exist - exec with userlistDISA STIG Solaris 10 SPARC v2r4Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN003608 - Proxy Address Resolution Protocol (Proxy ARP) must not be enabled on the system.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN003609 - The system must ignore IPv4 ICMP redirect messages - 'net.ipv4.conf.all.accept_redirects'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN003609 - The system must ignore IPv4 ICMP redirect messages - 'net.ipv4.conf.default.accept_redirects'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN003619 - The system must not be configured for network bridging.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN003860 - The system must not have the finger service active.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN007660 - The Bluetooth protocol handler must be disabled or not installed - 'install bluetooth /bin/true'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN007780 - The system must not have 6to4 enabled.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN007800 - The system must not have Teredo enabled.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN007820 - The system must not have IP tunnels configured - '/sbin/ip -6 tun list'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN007820 - The system must not have IP tunnels configured - '/sbin/ip tun list'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GOOG-09-004500 - The Google Android Pie must be configured to disable exceptions to the access control policy that prevents application processes from accessing all data stored by other application processes - Copy/PasteMobileIron - DISA Google Android 9.x v2r1MDM

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GOOG-09-004500 - The Google Android Pie must be configured to disable exceptions to the access control policy that prevents application processes from accessing all data stored by other application processes - Sharing data into the profileMobileIron - DISA Google Android 9.x v2r1MDM

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GOOG-09-004500 - The Google Android Pie must be configured to disable exceptions to the access control policy that prevents application processes from accessing all data stored by other application processes.AirWatch - DISA Google Android 9.x v2r1MDM

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GOOG-10-004500 - Google Android 10 must be configured to disable exceptions to the access control policy that prevents application processes from accessing all data stored by other application processes - Copy/PasteMobileIron - DISA Google Android 10.x v2r1MDM

ACCESS CONTROL, CONFIGURATION MANAGEMENT

JUNI-ND-000140 - The Juniper router must be configured to enforce approved authorizations for controlling the flow of management information within the device based on control policies.DISA STIG Juniper Router NDM v3r1Juniper

ACCESS CONTROL

JUNI-RT-000020 - The Juniper router must be configured to implement message authentication for all control plane protocols - BGPDISA STIG Juniper Router RTR v3r1Juniper

ACCESS CONTROL, CONFIGURATION MANAGEMENT

JUNI-RT-000020 - The Juniper router must be configured to implement message authentication for all control plane protocols - IS-IS keyDISA STIG Juniper Router RTR v3r1Juniper

ACCESS CONTROL, CONFIGURATION MANAGEMENT

JUNI-RT-000020 - The Juniper router must be configured to implement message authentication for all control plane protocols - LDPDISA STIG Juniper Router RTR v3r1Juniper

ACCESS CONTROL, CONFIGURATION MANAGEMENT

JUNI-RT-000020 - The Juniper router must be configured to implement message authentication for all control plane protocols - RIP keyDISA STIG Juniper Router RTR v3r1Juniper

ACCESS CONTROL, CONFIGURATION MANAGEMENT

JUNI-RT-000030 - The Juniper router must be configured to use keys with a duration not exceeding 180 days for authenticating routing protocol messages.DISA STIG Juniper Router RTR v3r1Juniper

ACCESS CONTROL, CONFIGURATION MANAGEMENT