Item Search

NameAudit NamePluginCategory
AMLS-L3-000250 - The Arista Multilayer Switch must encrypt all methods of configured authentication for the OSPF routing protocol - ospf message-digestDISA STIG Arista MLS DCS-7000 Series RTR v1r3Arista

IDENTIFICATION AND AUTHENTICATION

AMLS-L3-000250 - The Arista Multilayer Switch must encrypt all methods of configured authentication for the OSPF routing protocol - ospf message-digest-keyDISA STIG Arista MLS DCS-7000 Series RTR v1r3Arista

IDENTIFICATION AND AUTHENTICATION

AMLS-L3-000320 - The Arista Multilayer Switch must not enable the RIP routing protocol.DISA STIG Arista MLS DCS-7000 Series RTR v1r3Arista

CONFIGURATION MANAGEMENT

APPL-12-000054 - The macOS system must implement approved ciphers to protect the confidentiality of SSH connections.DISA STIG Apple macOS 12 v1r4Unix
APPL-12-000054 - The macOS system must implement approved ciphers to protect the confidentiality of SSH connections.DISA STIG Apple macOS 12 V1R2Unix
APPL-12-000054 - The macOS system must implement approved ciphers to protect the confidentiality of SSH connections.DISA STIG Apple macOS 12 v1r5Unix
APPL-12-000054 - The macOS system must implement approved ciphers to protect the confidentiality of SSH connections.DISA STIG Apple macOS 12 v1r7Unix
APPL-12-000054 - The macOS system must implement approved ciphers to protect the confidentiality of SSH connections.DISA STIG Apple macOS 12 v1r3Unix
APPL-12-000054 - The macOS system must implement approved ciphers within the SSH server configuration to protect the confidentiality of SSH connections.DISA STIG Apple macOS 12 v1r8Unix
APPL-12-000055 - The macOS system must implement approved Message Authentication Codes (MACs) within the SSH server configuration.DISA STIG Apple macOS 12 v1r8Unix
APPL-12-000055 - The macOS system must use only Message Authentication Codes (MACs) employing FIPS 140-2 validated cryptographic hash algorithms.DISA STIG Apple macOS 12 v1r7Unix
APPL-12-000055 - The macOS system must use only Message Authentication Codes (MACs) employing FIPS 140-2 validated cryptographic hash algorithms.DISA STIG Apple macOS 12 v1r3Unix
APPL-12-000055 - The macOS system must use only Message Authentication Codes (MACs) employing FIPS 140-2 validated cryptographic hash algorithms.DISA STIG Apple macOS 12 v1r5Unix
APPL-12-000055 - The macOS system must use only Message Authentication Codes (MACs) employing FIPS 140-2 validated cryptographic hash algorithms.DISA STIG Apple macOS 12 v1r4Unix
APPL-12-000055 - The macOS system must use only Message Authentication Codes (MACs) employing FIPS 140-2 validated cryptographic hash algorithms.DISA STIG Apple macOS 12 V1R2Unix
APPL-12-000056 - The macOS system must implement an approved Key Exchange Algorithm.DISA STIG Apple macOS 12 V1R2Unix
APPL-12-000056 - The macOS system must implement an approved Key Exchange Algorithm.DISA STIG Apple macOS 12 v1r4Unix
APPL-12-000056 - The macOS system must implement an approved Key Exchange Algorithm.DISA STIG Apple macOS 12 v1r3Unix
APPL-12-000056 - The macOS system must implement an approved Key Exchange Algorithm.DISA STIG Apple macOS 12 v1r5Unix
APPL-12-000056 - The macOS system must implement an approved Key Exchange Algorithm.DISA STIG Apple macOS 12 v1r7Unix
APPL-12-000056 - The macOS system must implement approved Key Exchange Algorithms within the SSH server configuration.DISA STIG Apple macOS 12 v1r8Unix
DTOO257 - S/Mime interoperability with external clients for message handling must be configured.DISA STIG Microsoft Outlook 2016 v2r3Windows

IDENTIFICATION AND AUTHENTICATION

DTOO260 - Message formats must be set to use SMime.DISA STIG Microsoft Outlook 2016 v2r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO260 - Message formats must be set to use SMime.DISA STIG Microsoft Outlook 2016 v2r3Windows

IDENTIFICATION AND AUTHENTICATION

DTOO262 - Run in FIPS compliant mode must be enforced.DISA STIG Microsoft Outlook 2016 v2r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO262 - Run in FIPS compliant mode must be enforced.DISA STIG Microsoft Outlook 2016 v2r3Windows

IDENTIFICATION AND AUTHENTICATION

EP11-00-004900 - The EDB Postgres Advanced Server must use NIST FIPS 140-2 or 140-3 validated cryptographic modules for all cryptographic operations including generation of cryptographic hashes and data protection - alg_sectionEDB PostgreSQL Advanced Server v11 Windows OS Audit v2r2Windows
EP11-00-013200 - The EDB Postgres Advanced Server must be configured on a platform that has a NIST certified FIPS 140-2 or 140-3 installation of OpenSSL.EDB PostgreSQL Advanced Server v11 Windows OS Audit v2r3Windows
GEN000590 - The system must use a FIPS 140-2 approved cryptographic hashing algorithm for generating account password hashes - CRYPT_ALGORITHMS_ALLOWDISA STIG Solaris 10 SPARC v2r2Unix

SYSTEM AND COMMUNICATIONS PROTECTION

GEN000590 - The system must use a FIPS 140-2 approved cryptographic hashing algorithm for generating account password hashes - CRYPT_ALGORITHMS_ALLOWDISA STIG Solaris 10 X86 v2r2Unix

SYSTEM AND COMMUNICATIONS PROTECTION

GEN000590 - The system must use a FIPS 140-2 approved cryptographic hashing algorithm for generating account password hashes - CRYPT_ALGORITHMS_ALLOWDISA STIG Solaris 10 SPARC v2r4Unix

IDENTIFICATION AND AUTHENTICATION

GEN000590 - The system must use a FIPS 140-2 approved cryptographic hashing algorithm for generating account password hashes - CRYPT_ALGORITHMS_ALLOWDISA STIG Solaris 10 SPARC v2r1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

GEN000590 - The system must use a FIPS 140-2 approved cryptographic hashing algorithm for generating account password hashes - CRYPT_ALGORITHMS_ALLOWDISA STIG Solaris 10 X86 v2r1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

GEN000590 - The system must use a FIPS 140-2 approved cryptographic hashing algorithm for generating account password hashes - CRYPT_ALGORITHMS_ALLOWDISA STIG Solaris 10 X86 v2r4Unix

IDENTIFICATION AND AUTHENTICATION

GEN000590 - The system must use a FIPS 140-2 approved cryptographic hashing algorithm for generating account password hashes - CRYPT_DEFAULTDISA STIG Solaris 10 X86 v2r1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

GEN000590 - The system must use a FIPS 140-2 approved cryptographic hashing algorithm for generating account password hashes - CRYPT_DEFAULTDISA STIG Solaris 10 SPARC v2r1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

GEN000590 - The system must use a FIPS 140-2 approved cryptographic hashing algorithm for generating account password hashes - CRYPT_DEFAULTDISA STIG Solaris 10 SPARC v2r2Unix

SYSTEM AND COMMUNICATIONS PROTECTION

GEN000590 - The system must use a FIPS 140-2 approved cryptographic hashing algorithm for generating account password hashes - CRYPT_DEFAULTDISA STIG Solaris 10 SPARC v2r4Unix

IDENTIFICATION AND AUTHENTICATION

GEN000590 - The system must use a FIPS 140-2 approved cryptographic hashing algorithm for generating account password hashes - CRYPT_DEFAULTDISA STIG Solaris 10 X86 v2r4Unix

IDENTIFICATION AND AUTHENTICATION

GEN000590 - The system must use a FIPS 140-2 approved cryptographic hashing algorithm for generating account password hashes - CRYPT_DEFAULTDISA STIG Solaris 10 X86 v2r2Unix

SYSTEM AND COMMUNICATIONS PROTECTION

GEN000590 - The system must use a FIPS 140-2 approved cryptographic hashing algorithm for generating account password hashes.DISA STIG for Oracle Linux 5 v2r1Unix

IDENTIFICATION AND AUTHENTICATION

GEN000590 - The system must use a FIPS 140-2 approved cryptographic hashing algorithm for generating account password hashes.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

IDENTIFICATION AND AUTHENTICATION

JUSX-VN-000020 - The Juniper SRX Services Gateway VPN must use FIPS 140-2 compliant mechanisms for authentication to a cryptographic module.DISA Juniper SRX Services Gateway VPN v2r2Juniper
MD3X-00-000380 - MongoDB must use NIST FIPS 140-2-validated cryptographic modules for cryptographic operations.DISA STIG MongoDB Enterprise Advanced 3.x v2r1 OSUnix
O112-C2-015700 - The DBMS must use NIST-validated FIPS 140-2-compliant cryptography for authentication mechanisms.DISA STIG Oracle 11.2g v2r4 LinuxUnix
O112-C2-016600 - The DBMS must implement required cryptographic protections using cryptographic modules complying with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance.DISA STIG Oracle 11.2g v2r4 DatabaseOracleDB
SLES-12-010220 - The SUSE operating system must employ FIPS 140-2-approved cryptographic hashing algorithms for all stored passwords.DISA SLES 12 STIG v2r12Unix
SLES-12-010230 - The SUSE operating system must configure the Linux Pluggable Authentication Modules (PAM) to only store encrypted representations of passwords - sha512DISA SLES 12 STIG v2r6Unix
SLES-12-010240 - The SUSE operating system must employ FIPS 140-2-approved cryptographic hashing algorithms for all stored passwords.DISA SLES 12 STIG v2r11Unix
SQL4-00-031100 - SQL Server must use NIST FIPS 140-2 validated cryptographic modules for cryptographic operations.DISA STIG SQL Server 2014 Instance OS Audit v1r10Windows

SYSTEM AND COMMUNICATIONS PROTECTION