CD12-00-001300 - The role(s)/group(s) used to modify database structure (including but not necessarily limited to tables, indexes, storage, etc.) and logic modules (functions, trigger procedures, links to software external to PostgreSQL, etc.) must be restricted to authorized users. | DISA STIG Crunchy Data PostgreSQL OS v3r1 | Unix | CONFIGURATION MANAGEMENT |
CD12-00-003300 - Database software, including PostgreSQL configuration files, must be stored in dedicated directories separate from the host OS and other applications. | DISA STIG Crunchy Data PostgreSQL DB v3r1 | PostgreSQLDB | CONFIGURATION MANAGEMENT |
CNTR-K8-000850 - Kubernetes Kubelet must deny hostname override. | DISA STIG Kubernetes v2r1 | Unix | CONFIGURATION MANAGEMENT |
CNTR-K8-000880 - The Kubernetes KubeletConfiguration file must be owned by root. | DISA STIG Kubernetes v2r1 | Unix | CONFIGURATION MANAGEMENT |
CNTR-K8-000890 - The Kubernetes KubeletConfiguration files must have file permissions set to 644 or more restrictive. | DISA STIG Kubernetes v2r1 | Unix | CONFIGURATION MANAGEMENT |
EPAS-00-003200 - Software, applications, and configuration files that are part of, or related to, the EDB Postgres Advanced Server installation must be monitored to discover unauthorized changes. | EnterpriseDB PostgreSQL Advanced Server OS Linux v2r1 | Unix | CONFIGURATION MANAGEMENT |
EPAS-00-003300 - The EDB Postgres Advanced Server software installation account must be restricted to authorized users. | EnterpriseDB PostgreSQL Advanced Server DB v2r1 | PostgreSQLDB | CONFIGURATION MANAGEMENT |
EPAS-00-003500 - Database objects must be owned by database/EDB Postgres Advanced Server principals authorized for ownership. | EnterpriseDB PostgreSQL Advanced Server DB v2r1 | PostgreSQLDB | CONFIGURATION MANAGEMENT |
FGFW-ND-000155 - The FortiGate device must limit privileges to change the software resident within software libraries. | DISA Fortigate Firewall NDM STIG v1r4 | FortiGate | CONFIGURATION MANAGEMENT |
MADB-10-002600 - MariaDB must limit privileges to change software modules, to include stored procedures, functions and triggers, and links to software external to the DBMS. | DISA MariaDB Enterprise 10.x v2r1 DB | MySQLDB | CONFIGURATION MANAGEMENT |
MADB-10-002800 - Database software, including MariaDB configuration files, must be stored in dedicated directories, separate from the host OS and other applications. | DISA MariaDB Enterprise 10.x v2r1 DB | MySQLDB | CONFIGURATION MANAGEMENT |
MADB-10-003000 - The role(s)/group(s) used to modify database structure (including but not necessarily limited to tables, indexes, storage, etc.) and logic modules (stored procedures, functions, triggers, links to software external to the MariaDB, etc.) must be restricted to authorized users. | DISA MariaDB Enterprise 10.x v2r1 DB | MySQLDB | CONFIGURATION MANAGEMENT |
MD4X-00-002200 - Database software, including DBMS configuration files, must be stored in dedicated directories, or DASD pools, separate from the host OS and other applications. | DISA STIG MongoDB Enterprise Advanced 4.x v1r4 OS | Unix | CONFIGURATION MANAGEMENT |
MD4X-00-002300 - Database objects (including but not limited to tables, indexes, storage, stored procedures, functions, triggers, links to software external to MongoDB, etc.) must be owned by database/DBMS principals authorized for ownership. | DISA STIG MongoDB Enterprise Advanced 4.x v1r4 DB | MongoDB | CONFIGURATION MANAGEMENT |
MD4X-00-002400 - The role(s)/group(s) used to modify database structure (including but not necessarily limited to tables, indexes, storage, etc.) and logic modules (stored procedures, functions, triggers, links to software external to MongoDB, etc.) must be restricted to authorized users. | DISA STIG MongoDB Enterprise Advanced 4.x v1r4 DB | MongoDB | CONFIGURATION MANAGEMENT |
MYS8-00-008300 - The MySQL Database Server 8.0 must limit privileges to change software modules, to include stored procedures, functions and triggers, and links to software external to the MySQL Database Server 8.0. | DISA Oracle MySQL 8.0 v2r1 DB | MySQLDB | CONFIGURATION MANAGEMENT |
OL08-00-010300 - OL 8 system commands must have mode 755 or less permissive. | DISA Oracle Linux 8 STIG v2r1 | Unix | CONFIGURATION MANAGEMENT |
OL08-00-010310 - OL 8 system commands must be owned by root. | DISA Oracle Linux 8 STIG v2r1 | Unix | CONFIGURATION MANAGEMENT |
OL08-00-010320 - OL 8 system commands must be group-owned by root or a system account. | DISA Oracle Linux 8 STIG v2r1 | Unix | CONFIGURATION MANAGEMENT |
OL08-00-010331 - OL 8 library directories must have mode 755 or less permissive. | DISA Oracle Linux 8 STIG v2r1 | Unix | CONFIGURATION MANAGEMENT |
RHEL-08-010330 - RHEL 8 library files must have mode 755 or less permissive. | DISA Red Hat Enterprise Linux 8 STIG v2r1 | Unix | CONFIGURATION MANAGEMENT |
RHEL-08-010341 - RHEL 8 library directories must be owned by root. | DISA Red Hat Enterprise Linux 8 STIG v2r1 | Unix | CONFIGURATION MANAGEMENT |
RHEL-08-010350 - RHEL 8 library files must be group-owned by root or a system account. | DISA Red Hat Enterprise Linux 8 STIG v2r1 | Unix | CONFIGURATION MANAGEMENT |
RHEL-08-010351 - RHEL 8 library directories must be group-owned by root or a system account. | DISA Red Hat Enterprise Linux 8 STIG v2r1 | Unix | CONFIGURATION MANAGEMENT |
RHEL-09-232010 - RHEL 9 system commands must have mode 755 or less permissive. | DISA Red Hat Enterprise Linux 9 STIG v2r2 | Unix | CONFIGURATION MANAGEMENT |
RHEL-09-232215 - RHEL 9 library directories must be group-owned by root or a system account. | DISA Red Hat Enterprise Linux 9 STIG v2r2 | Unix | CONFIGURATION MANAGEMENT |
SLES-12-010874 - The SUSE operating system library directories must be owned by root. | DISA SLES 12 STIG v2r13 | Unix | CONFIGURATION MANAGEMENT |
SLES-12-010879 - The SUSE operating system must have system commands owned by root. | DISA SLES 12 STIG v2r13 | Unix | CONFIGURATION MANAGEMENT |
SLES-12-010882 - The SUSE operating system must have system commands group-owned by root or a system account. | DISA SLES 12 STIG v2r13 | Unix | CONFIGURATION MANAGEMENT |
SLES-15-010352 - The SUSE operating system library directories must have mode 0755 or less permissive. | DISA SLES 15 STIG v2r1 | Unix | CONFIGURATION MANAGEMENT |
SLES-15-010355 - The SUSE operating system library files must be group-owned by root. | DISA SLES 15 STIG v2r1 | Unix | CONFIGURATION MANAGEMENT |
SLES-15-010358 - The SUSE operating system must have directories that contain system commands set to a mode of 0755 or less permissive. | DISA SLES 15 STIG v2r1 | Unix | CONFIGURATION MANAGEMENT |
SLES-15-010359 - The SUSE operating system must have system commands owned by root. | DISA SLES 15 STIG v2r1 | Unix | CONFIGURATION MANAGEMENT |
SLES-15-010360 - The SUSE operating system must have directories that contain system commands owned by root. | DISA SLES 15 STIG v2r1 | Unix | CONFIGURATION MANAGEMENT |
SQL2-00-004400 - SQL Server must not grant users direct access to the View Any Database permission. | DISA STIG SQL Server 2012 DB Instance Security v1r20 | MS_SQLDB | CONFIGURATION MANAGEMENT |
SQL2-00-014900 - SQL Server must be monitored to discover unauthorized changes to functions. | DISA STIG SQL Server 2012 Database Audit v1r20 | MS_SQLDB | CONFIGURATION MANAGEMENT |
SQL2-00-015100 - SQL Server must be monitored to discover unauthorized changes to triggers. | DISA STIG SQL Server 2012 Database Audit v1r20 | MS_SQLDB | CONFIGURATION MANAGEMENT |
SQL2-00-015200 - SQL Server must be monitored to discover unauthorized changes to stored procedures. | DISA STIG SQL Server 2012 Database Audit v1r20 | MS_SQLDB | CONFIGURATION MANAGEMENT |
SQL2-00-015300 - SQL Server must monitor for security-relevant configuration settings to discover unauthorized changes. | DISA STIG SQL Server 2012 DB Instance Security v1r20 | MS_SQLDB | CONFIGURATION MANAGEMENT |
SQL2-00-015610 - In a database owned by [sa], or by any other login having administrative privileges at the instance level, the database property TRUSTWORTHY must be OFF. | DISA STIG SQL Server 2012 Database Audit v1r20 | MS_SQLDB | CONFIGURATION MANAGEMENT |
SQL2-00-015700 - Vendor-supported software and patches must be evaluated and patched against newly found vulnerabilities. | DISA STIG SQL Server 2012 DB Instance Security v1r20 | MS_SQLDB | CONFIGURATION MANAGEMENT |
UBTU-20-010426 - The Ubuntu operating system library files must have mode 0755 or less permissive. | DISA STIG Ubuntu 20.04 LTS v2r1 | Unix | CONFIGURATION MANAGEMENT |
UBTU-20-010429 - The Ubuntu operating system library directories must be owned by root. | DISA STIG Ubuntu 20.04 LTS v2r1 | Unix | CONFIGURATION MANAGEMENT |
UBTU-20-010457 - The Ubuntu operating system must have system commands owned by root or a system account. | DISA STIG Ubuntu 20.04 LTS v2r1 | Unix | CONFIGURATION MANAGEMENT |
UBTU-22-232060 - Ubuntu 22.04 LTS library directories must be owned by 'root'. | DISA STIG Canonical Ubuntu 22.04 LTS v2r2 | Unix | CONFIGURATION MANAGEMENT |
UBTU-22-232070 - Ubuntu 22.04 LTS library files must be owned by 'root'. | DISA STIG Canonical Ubuntu 22.04 LTS v2r2 | Unix | CONFIGURATION MANAGEMENT |
UBTU-22-232075 - Ubuntu 22.04 LTS library files must be group-owned by 'root'. | DISA STIG Canonical Ubuntu 22.04 LTS v2r2 | Unix | CONFIGURATION MANAGEMENT |
VCPF-80-000034 The vCenter Perfcharts service must limit privileges for creating or modifying hosted application shared files. | DISA VMware vSphere 8.0 vCenter Appliance Perfcharts STIG v2r1 | Unix | CONFIGURATION MANAGEMENT |
VCPG-70-000007 - VMware Postgres must limit modify privileges to authorized accounts. | DISA STIG VMware vSphere 7.0 PostgreSQL v1r2 | Unix | CONFIGURATION MANAGEMENT |
VCST-80-000034 The vCenter STS service must limit privileges for creating or modifying hosted application shared files. | DISA VMware vSphere 8.0 vCenter Appliance Secure Token Service (STS) STIG v2r1 | Unix | CONFIGURATION MANAGEMENT |