Item Search

NameAudit NamePluginCategory
APPL-14-000033 - The macOS system must disable FileVault automatic log on.DISA Apple macOS 14 (Sonoma) STIG v2r1Unix

ACCESS CONTROL

APPL-14-002003 - The macOS system must disable Network File System service.DISA Apple macOS 14 (Sonoma) STIG v2r1Unix

ACCESS CONTROL

APPL-14-002006 - The macOS system must disable Unix-to-Unix Copy Protocol service.DISA Apple macOS 14 (Sonoma) STIG v2r1Unix

ACCESS CONTROL

APPL-14-002050 - The macOS system must disable Screen Sharing and Apple Remote Desktop.DISA Apple macOS 14 (Sonoma) STIG v2r1Unix

ACCESS CONTROL

APPL-15-002001 - The macOS system must disable Server Message Block (SMB) sharing.DISA Apple macOS 15 (Sequoia) STIG v1r1Unix

ACCESS CONTROL

APPL-15-002006 - The macOS system must disable Unix-to-Unix Copy Protocol (UUCP) service.DISA Apple macOS 15 (Sequoia) STIG v1r1Unix

ACCESS CONTROL

APPL-15-002008 - The macOS system must disable the built-in web server.DISA Apple macOS 15 (Sequoia) STIG v1r1Unix

ACCESS CONTROL

APPL-15-002050 - The macOS system must disable Screen Sharing and Apple Remote Desktop.DISA Apple macOS 15 (Sequoia) STIG v1r1Unix

ACCESS CONTROL

APPL-15-005070 - The macOS system must enable Authenticated Root.DISA Apple macOS 15 (Sequoia) STIG v1r1Unix

ACCESS CONTROL

CNTR-K8-000270 - The Kubernetes API Server must enable Node,RBAC as the authorization mode.DISA STIG Kubernetes v2r1Unix

ACCESS CONTROL

CNTR-K8-000330 - The Kubernetes Kubelet must have the 'readOnlyPort' flag disabled - readOnlyPort flag disabled.DISA STIG Kubernetes v2r1Unix

ACCESS CONTROL

CNTR-K8-000340 - The Kubernetes API server must have the insecure bind address not set.DISA STIG Kubernetes v2r1Unix

ACCESS CONTROL

CNTR-K8-000360 - The Kubernetes API server must have anonymous authentication disabled.DISA STIG Kubernetes v2r1Unix

ACCESS CONTROL

CNTR-K8-000420 - Kubernetes dashboard must not be enabled.DISA STIG Kubernetes v2r1Unix

ACCESS CONTROL

CNTR-K8-000450 - Kubernetes DynamicAuditing must not be enabled - kubeletDISA STIG Kubernetes v2r1Unix

ACCESS CONTROL

EPAS-00-000800 - The EDB Postgres Advanced Server must enforce approved authorizations for logical access to information and system resources in accordance with applicable access control policies.EnterpriseDB PostgreSQL Advanced Server OS Linux v2r1Unix

ACCESS CONTROL

EX19-ED-000016 Exchange servers must use approved DOD certificates.DISA Microsoft Exchange 2019 Edge Server STIG v2r1Windows

ACCESS CONTROL

F5BI-AP-000240 - The F5 BIG-IP appliance must enforce approved authorizations for logical access to resources by explicitly configuring assigned resources with an authorization list.DISA F5 BIG-IP Access Policy Manager STIG v2r3F5

ACCESS CONTROL

MD4X-00-001700 - MongoDB must enforce approved authorizations for logical access to information and system resources in accordance with applicable access control policies.DISA STIG MongoDB Enterprise Advanced 4.x v1r4 DBMongoDB

ACCESS CONTROL

OL07-00-010483 - Oracle Linux operating systems version 7.2 or newer booted with a BIOS must have a unique name for the grub superusers account when booting into single-user and maintenance modes.DISA Oracle Linux 7 STIG v2r14Unix

ACCESS CONTROL

OL08-00-010141 - OL 8 operating systems booted with United Extensible Firmware Interface (UEFI) must have a unique name for the grub superusers account when booting into single-user mode and maintenance.DISA Oracle Linux 8 STIG v2r1Unix

ACCESS CONTROL

OL08-00-010151 - OL 8 operating systems must require authentication upon booting into rescue mode.DISA Oracle Linux 8 STIG v2r1Unix

ACCESS CONTROL

PHTN-40-000046 The Photon operating system must require authentication upon booting into single-user and maintenance modes.DISA VMware vSphere 8.0 vCenter Appliance Photon OS 4.0 STIG v2r1Unix

ACCESS CONTROL

RHEL-08-010140 - RHEL 8 operating systems booted with United Extensible Firmware Interface (UEFI) must require authentication upon booting into single-user mode and maintenance.DISA Red Hat Enterprise Linux 8 STIG v2r1Unix

ACCESS CONTROL

RHEL-08-010149 - RHEL 8 operating systems booted with a BIOS must require a unique superusers name upon booting into single-user and maintenance modes.DISA Red Hat Enterprise Linux 8 STIG v2r1Unix

ACCESS CONTROL

RHEL-09-212010 - RHEL 9 must require a boot loader superuser password.DISA Red Hat Enterprise Linux 9 STIG v2r2Unix

ACCESS CONTROL

RHEL-09-212020 - RHEL 9 must require a unique superusers name upon booting into single-user and maintenance modes.DISA Red Hat Enterprise Linux 9 STIG v2r2Unix

ACCESS CONTROL

SYMP-NM-000020 - Symantec ProxySG must be configured to enforce user authorization to implement least privilege.DISA Symantec ProxySG Benchmark NDM v1r2BlueCoat

ACCESS CONTROL

VCLU-80-000130 The vCenter Lookup service DefaultServlet must be set to 'readonly' for 'PUT' and 'DELETE' commands.DISA VMware vSphere 8.0 vCenter Appliance Lookup Service STIG v2r1Unix

ACCESS CONTROL

VCPF-80-000129 The vCenter Perfcharts service cookies must have 'http-only' flag set.DISA VMware vSphere 8.0 vCenter Appliance Perfcharts STIG v2r1Unix

ACCESS CONTROL

VCST-80-000005 The vCenter STS service cookies must have secure flag set.DISA VMware vSphere 8.0 vCenter Appliance Secure Token Service (STS) STIG v2r1Unix

ACCESS CONTROL

VCST-80-000129 The vCenter STS service cookies must have 'http-only' flag set.DISA VMware vSphere 8.0 vCenter Appliance Secure Token Service (STS) STIG v2r1Unix

ACCESS CONTROL

VCST-80-000130 The vCenter STS service DefaultServlet must be set to 'readonly' for 'PUT' and 'DELETE' commands.DISA VMware vSphere 8.0 vCenter Appliance Secure Token Service (STS) STIG v2r1Unix

ACCESS CONTROL

VCUI-80-000129 The vCenter UI service cookies must have 'http-only' flag set.DISA VMware vSphere 8.0 vCenter Appliance User Interface (UI) STIG v2r1Unix

ACCESS CONTROL

VCUI-80-000130 The vCenter UI service DefaultServlet must be set to 'readonly' for 'PUT' and 'DELETE' commands.DISA VMware vSphere 8.0 vCenter Appliance User Interface (UI) STIG v2r1Unix

ACCESS CONTROL

WBSP-AS-000211 - The WebSphere Application Server Java 2 security must be enabled.DISA IBM WebSphere Traditional 9 Windows STIG v1r1Windows

ACCESS CONTROL

WBSP-AS-000211 - The WebSphere Application Server Java 2 security must be enabled.DISA IBM WebSphere Traditional 9 STIG v1r1Unix

ACCESS CONTROL

WBSP-AS-000211 - The WebSphere Application Server Java 2 security must be enabled.DISA IBM WebSphere Traditional 9 STIG v1r1 MiddlewareUnix

ACCESS CONTROL

WBSP-AS-000212 - The WebSphere Application Server Java 2 security must not be bypassed.DISA IBM WebSphere Traditional 9 Windows STIG v1r1Windows

ACCESS CONTROL

WN11-00-000050 - Local volumes must be formatted using NTFS.DISA Windows 11 STIG v2r2Windows

ACCESS CONTROL

WN11-UR-000025 - The 'Allow log on locally' user right must only be assigned to the Administrators and Users groups.DISA Windows 11 STIG v2r2Windows

ACCESS CONTROL

WN11-UR-000080 - The 'Deny log on as a service' user right on Windows 11 domain-joined workstations must be configured to prevent access from highly privileged domain accounts.DISA Windows 11 STIG v2r2Windows

ACCESS CONTROL

WN22-00-000130 - Windows Server 2022 local volumes must use a format that supports NTFS attributes.DISA Windows Server 2022 STIG v2r2Windows

ACCESS CONTROL

WN22-DC-000340 - Windows Server 2022 Access this computer from the network user right must only be assigned to the Administrators, Authenticated Users, and Enterprise Domain Controllers groups on domain controllers.DISA Windows Server 2022 STIG v2r2Windows

ACCESS CONTROL

WN22-DC-000400 - Windows Server 2022 Deny log on locally user right on domain controllers must be configured to prevent unauthenticated access.DISA Windows Server 2022 STIG v2r2Windows

ACCESS CONTROL

WN22-MS-000070 - Windows Server 2022 Access this computer from the network user right must only be assigned to the Administrators and Authenticated Users groups on domain-joined member servers and standalone or nondomain-joined systems.DISA Windows Server 2022 STIG v2r2Windows

ACCESS CONTROL

WN22-MS-000080 - Windows Server 2022 Deny access to this computer from the network user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts and local accounts and from unauthenticated access on all systems.DISA Windows Server 2022 STIG v2r2Windows

ACCESS CONTROL

WN22-MS-000090 - Windows Server 2022 Deny log on as a batch job user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts and from unauthenticated access on all systems.DISA Windows Server 2022 STIG v2r2Windows

ACCESS CONTROL

WN22-MS-000110 - Windows Server 2022 Deny log on locally user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts and from unauthenticated access on all systems.DISA Windows Server 2022 STIG v2r2Windows

ACCESS CONTROL

WN22-UR-000030 - Windows Server 2022 Allow log on locally user right must only be assigned to the Administrators group.DISA Windows Server 2022 STIG v2r2Windows

ACCESS CONTROL