APPL-14-000033 - The macOS system must disable FileVault automatic log on. | DISA Apple macOS 14 (Sonoma) STIG v2r1 | Unix | ACCESS CONTROL |
APPL-14-002003 - The macOS system must disable Network File System service. | DISA Apple macOS 14 (Sonoma) STIG v2r1 | Unix | ACCESS CONTROL |
APPL-14-002006 - The macOS system must disable Unix-to-Unix Copy Protocol service. | DISA Apple macOS 14 (Sonoma) STIG v2r1 | Unix | ACCESS CONTROL |
APPL-14-002050 - The macOS system must disable Screen Sharing and Apple Remote Desktop. | DISA Apple macOS 14 (Sonoma) STIG v2r1 | Unix | ACCESS CONTROL |
APPL-15-002001 - The macOS system must disable Server Message Block (SMB) sharing. | DISA Apple macOS 15 (Sequoia) STIG v1r1 | Unix | ACCESS CONTROL |
APPL-15-002006 - The macOS system must disable Unix-to-Unix Copy Protocol (UUCP) service. | DISA Apple macOS 15 (Sequoia) STIG v1r1 | Unix | ACCESS CONTROL |
APPL-15-002008 - The macOS system must disable the built-in web server. | DISA Apple macOS 15 (Sequoia) STIG v1r1 | Unix | ACCESS CONTROL |
APPL-15-002050 - The macOS system must disable Screen Sharing and Apple Remote Desktop. | DISA Apple macOS 15 (Sequoia) STIG v1r1 | Unix | ACCESS CONTROL |
APPL-15-005070 - The macOS system must enable Authenticated Root. | DISA Apple macOS 15 (Sequoia) STIG v1r1 | Unix | ACCESS CONTROL |
CNTR-K8-000270 - The Kubernetes API Server must enable Node,RBAC as the authorization mode. | DISA STIG Kubernetes v2r1 | Unix | ACCESS CONTROL |
CNTR-K8-000330 - The Kubernetes Kubelet must have the 'readOnlyPort' flag disabled - readOnlyPort flag disabled. | DISA STIG Kubernetes v2r1 | Unix | ACCESS CONTROL |
CNTR-K8-000340 - The Kubernetes API server must have the insecure bind address not set. | DISA STIG Kubernetes v2r1 | Unix | ACCESS CONTROL |
CNTR-K8-000360 - The Kubernetes API server must have anonymous authentication disabled. | DISA STIG Kubernetes v2r1 | Unix | ACCESS CONTROL |
CNTR-K8-000420 - Kubernetes dashboard must not be enabled. | DISA STIG Kubernetes v2r1 | Unix | ACCESS CONTROL |
CNTR-K8-000450 - Kubernetes DynamicAuditing must not be enabled - kubelet | DISA STIG Kubernetes v2r1 | Unix | ACCESS CONTROL |
EPAS-00-000800 - The EDB Postgres Advanced Server must enforce approved authorizations for logical access to information and system resources in accordance with applicable access control policies. | EnterpriseDB PostgreSQL Advanced Server OS Linux v2r1 | Unix | ACCESS CONTROL |
EX19-ED-000016 Exchange servers must use approved DOD certificates. | DISA Microsoft Exchange 2019 Edge Server STIG v2r1 | Windows | ACCESS CONTROL |
F5BI-AP-000240 - The F5 BIG-IP appliance must enforce approved authorizations for logical access to resources by explicitly configuring assigned resources with an authorization list. | DISA F5 BIG-IP Access Policy Manager STIG v2r3 | F5 | ACCESS CONTROL |
MD4X-00-001700 - MongoDB must enforce approved authorizations for logical access to information and system resources in accordance with applicable access control policies. | DISA STIG MongoDB Enterprise Advanced 4.x v1r4 DB | MongoDB | ACCESS CONTROL |
OL07-00-010483 - Oracle Linux operating systems version 7.2 or newer booted with a BIOS must have a unique name for the grub superusers account when booting into single-user and maintenance modes. | DISA Oracle Linux 7 STIG v2r14 | Unix | ACCESS CONTROL |
OL08-00-010141 - OL 8 operating systems booted with United Extensible Firmware Interface (UEFI) must have a unique name for the grub superusers account when booting into single-user mode and maintenance. | DISA Oracle Linux 8 STIG v2r1 | Unix | ACCESS CONTROL |
OL08-00-010151 - OL 8 operating systems must require authentication upon booting into rescue mode. | DISA Oracle Linux 8 STIG v2r1 | Unix | ACCESS CONTROL |
PHTN-40-000046 The Photon operating system must require authentication upon booting into single-user and maintenance modes. | DISA VMware vSphere 8.0 vCenter Appliance Photon OS 4.0 STIG v2r1 | Unix | ACCESS CONTROL |
RHEL-08-010140 - RHEL 8 operating systems booted with United Extensible Firmware Interface (UEFI) must require authentication upon booting into single-user mode and maintenance. | DISA Red Hat Enterprise Linux 8 STIG v2r1 | Unix | ACCESS CONTROL |
RHEL-08-010149 - RHEL 8 operating systems booted with a BIOS must require a unique superusers name upon booting into single-user and maintenance modes. | DISA Red Hat Enterprise Linux 8 STIG v2r1 | Unix | ACCESS CONTROL |
RHEL-09-212010 - RHEL 9 must require a boot loader superuser password. | DISA Red Hat Enterprise Linux 9 STIG v2r2 | Unix | ACCESS CONTROL |
RHEL-09-212020 - RHEL 9 must require a unique superusers name upon booting into single-user and maintenance modes. | DISA Red Hat Enterprise Linux 9 STIG v2r2 | Unix | ACCESS CONTROL |
SYMP-NM-000020 - Symantec ProxySG must be configured to enforce user authorization to implement least privilege. | DISA Symantec ProxySG Benchmark NDM v1r2 | BlueCoat | ACCESS CONTROL |
VCLU-80-000130 The vCenter Lookup service DefaultServlet must be set to 'readonly' for 'PUT' and 'DELETE' commands. | DISA VMware vSphere 8.0 vCenter Appliance Lookup Service STIG v2r1 | Unix | ACCESS CONTROL |
VCPF-80-000129 The vCenter Perfcharts service cookies must have 'http-only' flag set. | DISA VMware vSphere 8.0 vCenter Appliance Perfcharts STIG v2r1 | Unix | ACCESS CONTROL |
VCST-80-000005 The vCenter STS service cookies must have secure flag set. | DISA VMware vSphere 8.0 vCenter Appliance Secure Token Service (STS) STIG v2r1 | Unix | ACCESS CONTROL |
VCST-80-000129 The vCenter STS service cookies must have 'http-only' flag set. | DISA VMware vSphere 8.0 vCenter Appliance Secure Token Service (STS) STIG v2r1 | Unix | ACCESS CONTROL |
VCST-80-000130 The vCenter STS service DefaultServlet must be set to 'readonly' for 'PUT' and 'DELETE' commands. | DISA VMware vSphere 8.0 vCenter Appliance Secure Token Service (STS) STIG v2r1 | Unix | ACCESS CONTROL |
VCUI-80-000129 The vCenter UI service cookies must have 'http-only' flag set. | DISA VMware vSphere 8.0 vCenter Appliance User Interface (UI) STIG v2r1 | Unix | ACCESS CONTROL |
VCUI-80-000130 The vCenter UI service DefaultServlet must be set to 'readonly' for 'PUT' and 'DELETE' commands. | DISA VMware vSphere 8.0 vCenter Appliance User Interface (UI) STIG v2r1 | Unix | ACCESS CONTROL |
WBSP-AS-000211 - The WebSphere Application Server Java 2 security must be enabled. | DISA IBM WebSphere Traditional 9 Windows STIG v1r1 | Windows | ACCESS CONTROL |
WBSP-AS-000211 - The WebSphere Application Server Java 2 security must be enabled. | DISA IBM WebSphere Traditional 9 STIG v1r1 | Unix | ACCESS CONTROL |
WBSP-AS-000211 - The WebSphere Application Server Java 2 security must be enabled. | DISA IBM WebSphere Traditional 9 STIG v1r1 Middleware | Unix | ACCESS CONTROL |
WBSP-AS-000212 - The WebSphere Application Server Java 2 security must not be bypassed. | DISA IBM WebSphere Traditional 9 Windows STIG v1r1 | Windows | ACCESS CONTROL |
WN11-00-000050 - Local volumes must be formatted using NTFS. | DISA Windows 11 STIG v2r2 | Windows | ACCESS CONTROL |
WN11-UR-000025 - The 'Allow log on locally' user right must only be assigned to the Administrators and Users groups. | DISA Windows 11 STIG v2r2 | Windows | ACCESS CONTROL |
WN11-UR-000080 - The 'Deny log on as a service' user right on Windows 11 domain-joined workstations must be configured to prevent access from highly privileged domain accounts. | DISA Windows 11 STIG v2r2 | Windows | ACCESS CONTROL |
WN22-00-000130 - Windows Server 2022 local volumes must use a format that supports NTFS attributes. | DISA Windows Server 2022 STIG v2r2 | Windows | ACCESS CONTROL |
WN22-DC-000340 - Windows Server 2022 Access this computer from the network user right must only be assigned to the Administrators, Authenticated Users, and Enterprise Domain Controllers groups on domain controllers. | DISA Windows Server 2022 STIG v2r2 | Windows | ACCESS CONTROL |
WN22-DC-000400 - Windows Server 2022 Deny log on locally user right on domain controllers must be configured to prevent unauthenticated access. | DISA Windows Server 2022 STIG v2r2 | Windows | ACCESS CONTROL |
WN22-MS-000070 - Windows Server 2022 Access this computer from the network user right must only be assigned to the Administrators and Authenticated Users groups on domain-joined member servers and standalone or nondomain-joined systems. | DISA Windows Server 2022 STIG v2r2 | Windows | ACCESS CONTROL |
WN22-MS-000080 - Windows Server 2022 Deny access to this computer from the network user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts and local accounts and from unauthenticated access on all systems. | DISA Windows Server 2022 STIG v2r2 | Windows | ACCESS CONTROL |
WN22-MS-000090 - Windows Server 2022 Deny log on as a batch job user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts and from unauthenticated access on all systems. | DISA Windows Server 2022 STIG v2r2 | Windows | ACCESS CONTROL |
WN22-MS-000110 - Windows Server 2022 Deny log on locally user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts and from unauthenticated access on all systems. | DISA Windows Server 2022 STIG v2r2 | Windows | ACCESS CONTROL |
WN22-UR-000030 - Windows Server 2022 Allow log on locally user right must only be assigned to the Administrators group. | DISA Windows Server 2022 STIG v2r2 | Windows | ACCESS CONTROL |