Item Search

NameAudit NamePluginCategory
AOSX-14-005001 - The macOS system must enable System Integrity Protection.DISA STIG Apple Mac OSX 10.14 v2r6Unix

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

AOSX-15-005001 - The macOS system must enable System Integrity Protection.DISA STIG Apple Mac OSX 10.15 v1r10Unix

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

APPL-11-005001 - The macOS system must enable System Integrity Protection.DISA STIG Apple macOS 11 v1r8Unix

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

APPL-11-005001 - The macOS system must enable System Integrity Protection.DISA STIG Apple macOS 11 v1r5Unix

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

APPL-12-005001 - The macOS system must enable System Integrity Protection.DISA STIG Apple macOS 12 v1r9Unix

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

APPL-13-005001 - The macOS system must enable System Integrity Protection.DISA STIG Apple macOS 13 v1r4Unix

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

APPL-14-005001 - The macOS system must ensure System Integrity Protection is enabled.DISA Apple macOS 14 (Sonoma) STIG v2r2Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

APPL-15-005001 - The macOS system must ensure System Integrity Protection is enabled.DISA Apple macOS 15 (Sequoia) STIG v1r1Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

GEN000000-LNX00480 - The /etc/sysctl.conf file must be owned by root.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN000000-LNX00500 - The /etc/sysctl.conf file must be group-owned by root.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN000000-LNX00520 - The /etc/sysctl.conf file must have mode 0600 or less permissive.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN000000-LNX00530 - The /etc/sysctl.conf file must not have an extended ACL.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN000000-LNX00620 - The /etc/securetty file must be group-owned by root, sys, or bin.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN000000-LNX001431 - The /etc/gshadow file must be owned by root.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN000000-LNX001432 - The /etc/gshadow file must be group-owned by root.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN000000-LNX001433 - The /etc/gshadow file must have mode 0400.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN000000-LNX001434 - The /etc/gshadow file must not have an extended ACL.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN003080-2 - Files in cron script directories must have mode 0700 or less permissive - '/etc/cron.daily/*'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN003080-2 - Files in cron script directories must have mode 0700 or less permissive - '/etc/cron.hourly/*'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN003080-2 - Files in cron script directories must have mode 0700 or less permissive - '/etc/cron.monthly/*'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN003080-2 - Files in cron script directories must have mode 0700 or less permissive - '/etc/cron.weekly/*'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN003250 - The cron.allow file must be group-owned by root, bin, sys, or cron.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN003260 - The cron.deny file must be owned by root, bin, or sys.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN003270 - The cron.deny file must be group-owned by root, bin, or sys.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN003320 - Default system accounts (with the exception of root) must not be listed in the at.allow file or must be included in the at.deny file if the at.allow file does not exist - 'lp'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN003360 - The at daemon must not execute group-writable or world-writable programs - at daemon must not execute group-writable or world-writable programs.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN003410 - The at directory must not have an extended ACL - at directory must not have an extended ACL.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN003460 - The at.allow file must be owned by root, bin, or sys.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN003490 - The at.deny file must be group-owned by root, bin, sys, or cron.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN003523 - The kernel core dump data directory must not have an extended ACL.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN003770 - The services file must be group-owned by root or bin.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN003940 - The hosts.lpd (or equivalent) must have mode 0644 or less permissive.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN003960 - The traceroute command owner must be root.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN004360 - The alias file must be owned by root - '/etc/aliases'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN004360 - The alias file must be owned by root - '/etc/postfix/aliases'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN004370 - The aliases file must be group-owned by root, sys, bin, or system - '/etc/aliases.db'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN004380 - The alias file must have mode 0644 or less permissive - '/etc/postfix/aliases.db'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN004380 - The alias file must have mode 0644 or less permissive - '/etc/postfix/aliases'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN004390 - The alias file must not have an extended ACL - '/etc/aliases'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Monterey - Ensure System Integrity Protection is EnabledNIST macOS Monterey v1.0.0 - 800-53r4 HighUnix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

Monterey - Ensure System Integrity Protection is EnabledNIST macOS Monterey v1.0.0 - 800-53r4 ModerateUnix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

Monterey - Ensure System Integrity Protection is EnabledNIST macOS Monterey v1.0.0 - 800-53r5 HighUnix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

Monterey - Ensure System Integrity Protection is EnabledNIST macOS Monterey v1.0.0 - 800-53r5 LowUnix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

Monterey - Ensure System Integrity Protection is EnabledNIST macOS Monterey v1.0.0 - All ProfilesUnix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

Monterey - Ensure System Integrity Protection is EnabledNIST macOS Monterey v1.0.0 - CNSSI 1253Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

WBSP-AS-000150 - The WebSphere Application Server users in a local user registry group must be authorized for that group.DISA IBM WebSphere Traditional 9 STIG v1r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

WBSP-AS-000150 - The WebSphere Application Server users in a local user registry group must be authorized for that group.DISA IBM WebSphere Traditional 9 Windows STIG v1r1Windows

ACCESS CONTROL, CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

WBSP-AS-000150 - The WebSphere Application Server users in a local user registry group must be authorized for that group.DISA IBM WebSphere Traditional 9 STIG v1r1 MiddlewareUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

WN12-GE-000008 - Permissions for Windows installation directory must conform to minimum requirements.DISA Windows Server 2012 and 2012 R2 DC STIG v3r7Windows

ACCESS CONTROL, CONFIGURATION MANAGEMENT

WN12-GE-000008 - Permissions for Windows installation directory must conform to minimum requirements.DISA Windows Server 2012 and 2012 R2 MS STIG v3r7Windows

ACCESS CONTROL, CONFIGURATION MANAGEMENT