Item Search

NameAudit NamePluginCategory
CD12-00-001300 - The role(s)/group(s) used to modify database structure (including but not necessarily limited to tables, indexes, storage, etc.) and logic modules (functions, trigger procedures, links to software external to PostgreSQL, etc.) must be restricted to authorized users.DISA STIG Crunchy Data PostgreSQL OS v3r1Unix

CONFIGURATION MANAGEMENT

CD12-00-003300 - Database software, including PostgreSQL configuration files, must be stored in dedicated directories separate from the host OS and other applications.DISA STIG Crunchy Data PostgreSQL DB v3r1PostgreSQLDB

CONFIGURATION MANAGEMENT

CNTR-K8-000850 - Kubernetes Kubelet must deny hostname override.DISA STIG Kubernetes v2r1Unix

CONFIGURATION MANAGEMENT

CNTR-K8-000880 - The Kubernetes KubeletConfiguration file must be owned by root.DISA STIG Kubernetes v2r1Unix

CONFIGURATION MANAGEMENT

CNTR-K8-000890 - The Kubernetes KubeletConfiguration files must have file permissions set to 644 or more restrictive.DISA STIG Kubernetes v2r1Unix

CONFIGURATION MANAGEMENT

EPAS-00-003200 - Software, applications, and configuration files that are part of, or related to, the EDB Postgres Advanced Server installation must be monitored to discover unauthorized changes.EnterpriseDB PostgreSQL Advanced Server OS Linux v2r1Unix

CONFIGURATION MANAGEMENT

EPAS-00-003300 - The EDB Postgres Advanced Server software installation account must be restricted to authorized users.EnterpriseDB PostgreSQL Advanced Server DB v2r1PostgreSQLDB

CONFIGURATION MANAGEMENT

EPAS-00-003500 - Database objects must be owned by database/EDB Postgres Advanced Server principals authorized for ownership.EnterpriseDB PostgreSQL Advanced Server DB v2r1PostgreSQLDB

CONFIGURATION MANAGEMENT

FGFW-ND-000155 - The FortiGate device must limit privileges to change the software resident within software libraries.DISA Fortigate Firewall NDM STIG v1r4FortiGate

CONFIGURATION MANAGEMENT

MADB-10-002600 - MariaDB must limit privileges to change software modules, to include stored procedures, functions and triggers, and links to software external to the DBMS.DISA MariaDB Enterprise 10.x v2r1 DBMySQLDB

CONFIGURATION MANAGEMENT

MADB-10-002800 - Database software, including MariaDB configuration files, must be stored in dedicated directories, separate from the host OS and other applications.DISA MariaDB Enterprise 10.x v2r1 DBMySQLDB

CONFIGURATION MANAGEMENT

MADB-10-003000 - The role(s)/group(s) used to modify database structure (including but not necessarily limited to tables, indexes, storage, etc.) and logic modules (stored procedures, functions, triggers, links to software external to the MariaDB, etc.) must be restricted to authorized users.DISA MariaDB Enterprise 10.x v2r1 DBMySQLDB

CONFIGURATION MANAGEMENT

MD4X-00-002200 - Database software, including DBMS configuration files, must be stored in dedicated directories, or DASD pools, separate from the host OS and other applications.DISA STIG MongoDB Enterprise Advanced 4.x v1r4 OSUnix

CONFIGURATION MANAGEMENT

MD4X-00-002300 - Database objects (including but not limited to tables, indexes, storage, stored procedures, functions, triggers, links to software external to MongoDB, etc.) must be owned by database/DBMS principals authorized for ownership.DISA STIG MongoDB Enterprise Advanced 4.x v1r4 DBMongoDB

CONFIGURATION MANAGEMENT

MD4X-00-002400 - The role(s)/group(s) used to modify database structure (including but not necessarily limited to tables, indexes, storage, etc.) and logic modules (stored procedures, functions, triggers, links to software external to MongoDB, etc.) must be restricted to authorized users.DISA STIG MongoDB Enterprise Advanced 4.x v1r4 DBMongoDB

CONFIGURATION MANAGEMENT

MYS8-00-008300 - The MySQL Database Server 8.0 must limit privileges to change software modules, to include stored procedures, functions and triggers, and links to software external to the MySQL Database Server 8.0.DISA Oracle MySQL 8.0 v2r1 DBMySQLDB

CONFIGURATION MANAGEMENT

OL08-00-010300 - OL 8 system commands must have mode 755 or less permissive.DISA Oracle Linux 8 STIG v2r1Unix

CONFIGURATION MANAGEMENT

OL08-00-010310 - OL 8 system commands must be owned by root.DISA Oracle Linux 8 STIG v2r1Unix

CONFIGURATION MANAGEMENT

OL08-00-010320 - OL 8 system commands must be group-owned by root or a system account.DISA Oracle Linux 8 STIG v2r1Unix

CONFIGURATION MANAGEMENT

OL08-00-010331 - OL 8 library directories must have mode 755 or less permissive.DISA Oracle Linux 8 STIG v2r1Unix

CONFIGURATION MANAGEMENT

RHEL-08-010330 - RHEL 8 library files must have mode 755 or less permissive.DISA Red Hat Enterprise Linux 8 STIG v2r1Unix

CONFIGURATION MANAGEMENT

RHEL-08-010341 - RHEL 8 library directories must be owned by root.DISA Red Hat Enterprise Linux 8 STIG v2r1Unix

CONFIGURATION MANAGEMENT

RHEL-08-010350 - RHEL 8 library files must be group-owned by root or a system account.DISA Red Hat Enterprise Linux 8 STIG v2r1Unix

CONFIGURATION MANAGEMENT

RHEL-08-010351 - RHEL 8 library directories must be group-owned by root or a system account.DISA Red Hat Enterprise Linux 8 STIG v2r1Unix

CONFIGURATION MANAGEMENT

RHEL-09-232010 - RHEL 9 system commands must have mode 755 or less permissive.DISA Red Hat Enterprise Linux 9 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-09-232215 - RHEL 9 library directories must be group-owned by root or a system account.DISA Red Hat Enterprise Linux 9 STIG v2r2Unix

CONFIGURATION MANAGEMENT

SLES-12-010874 - The SUSE operating system library directories must be owned by root.DISA SLES 12 STIG v2r13Unix

CONFIGURATION MANAGEMENT

SLES-12-010879 - The SUSE operating system must have system commands owned by root.DISA SLES 12 STIG v2r13Unix

CONFIGURATION MANAGEMENT

SLES-12-010882 - The SUSE operating system must have system commands group-owned by root or a system account.DISA SLES 12 STIG v2r13Unix

CONFIGURATION MANAGEMENT

SLES-15-010352 - The SUSE operating system library directories must have mode 0755 or less permissive.DISA SLES 15 STIG v2r1Unix

CONFIGURATION MANAGEMENT

SLES-15-010355 - The SUSE operating system library files must be group-owned by root.DISA SLES 15 STIG v2r1Unix

CONFIGURATION MANAGEMENT

SLES-15-010358 - The SUSE operating system must have directories that contain system commands set to a mode of 0755 or less permissive.DISA SLES 15 STIG v2r1Unix

CONFIGURATION MANAGEMENT

SLES-15-010359 - The SUSE operating system must have system commands owned by root.DISA SLES 15 STIG v2r1Unix

CONFIGURATION MANAGEMENT

SLES-15-010360 - The SUSE operating system must have directories that contain system commands owned by root.DISA SLES 15 STIG v2r1Unix

CONFIGURATION MANAGEMENT

SQL2-00-004400 - SQL Server must not grant users direct access to the View Any Database permission.DISA STIG SQL Server 2012 DB Instance Security v1r20MS_SQLDB

CONFIGURATION MANAGEMENT

SQL2-00-014900 - SQL Server must be monitored to discover unauthorized changes to functions.DISA STIG SQL Server 2012 Database Audit v1r20MS_SQLDB

CONFIGURATION MANAGEMENT

SQL2-00-015100 - SQL Server must be monitored to discover unauthorized changes to triggers.DISA STIG SQL Server 2012 Database Audit v1r20MS_SQLDB

CONFIGURATION MANAGEMENT

SQL2-00-015200 - SQL Server must be monitored to discover unauthorized changes to stored procedures.DISA STIG SQL Server 2012 Database Audit v1r20MS_SQLDB

CONFIGURATION MANAGEMENT

SQL2-00-015300 - SQL Server must monitor for security-relevant configuration settings to discover unauthorized changes.DISA STIG SQL Server 2012 DB Instance Security v1r20MS_SQLDB

CONFIGURATION MANAGEMENT

SQL2-00-015610 - In a database owned by [sa], or by any other login having administrative privileges at the instance level, the database property TRUSTWORTHY must be OFF.DISA STIG SQL Server 2012 Database Audit v1r20MS_SQLDB

CONFIGURATION MANAGEMENT

SQL2-00-015700 - Vendor-supported software and patches must be evaluated and patched against newly found vulnerabilities.DISA STIG SQL Server 2012 DB Instance Security v1r20MS_SQLDB

CONFIGURATION MANAGEMENT

UBTU-20-010426 - The Ubuntu operating system library files must have mode 0755 or less permissive.DISA STIG Ubuntu 20.04 LTS v2r1Unix

CONFIGURATION MANAGEMENT

UBTU-20-010429 - The Ubuntu operating system library directories must be owned by root.DISA STIG Ubuntu 20.04 LTS v2r1Unix

CONFIGURATION MANAGEMENT

UBTU-20-010457 - The Ubuntu operating system must have system commands owned by root or a system account.DISA STIG Ubuntu 20.04 LTS v2r1Unix

CONFIGURATION MANAGEMENT

UBTU-22-232060 - Ubuntu 22.04 LTS library directories must be owned by 'root'.DISA STIG Canonical Ubuntu 22.04 LTS v2r2Unix

CONFIGURATION MANAGEMENT

UBTU-22-232070 - Ubuntu 22.04 LTS library files must be owned by 'root'.DISA STIG Canonical Ubuntu 22.04 LTS v2r2Unix

CONFIGURATION MANAGEMENT

UBTU-22-232075 - Ubuntu 22.04 LTS library files must be group-owned by 'root'.DISA STIG Canonical Ubuntu 22.04 LTS v2r2Unix

CONFIGURATION MANAGEMENT

VCPF-80-000034 The vCenter Perfcharts service must limit privileges for creating or modifying hosted application shared files.DISA VMware vSphere 8.0 vCenter Appliance Perfcharts STIG v2r1Unix

CONFIGURATION MANAGEMENT

VCPG-70-000007 - VMware Postgres must limit modify privileges to authorized accounts.DISA STIG VMware vSphere 7.0 PostgreSQL v1r2Unix

CONFIGURATION MANAGEMENT

VCST-80-000034 The vCenter STS service must limit privileges for creating or modifying hosted application shared files.DISA VMware vSphere 8.0 vCenter Appliance Secure Token Service (STS) STIG v2r1Unix

CONFIGURATION MANAGEMENT