Item Search

NameAudit NamePluginCategory
AADC-CL-000840 - Adobe Acrobat Pro DC Classic privileged file and folder locations must be disabled.DISA STIG Adobe Acrobat Pro DC Classic Track v2r1Windows

CONFIGURATION MANAGEMENT

AOSX-13-000710 - The macOS system must allow only applications that have a valid digital signature to run - EnableAssessmentDISA STIG Apple Mac OSX 10.13 v2r5Unix

CONFIGURATION MANAGEMENT

AOSX-14-002064 - The macOS system must have the security assessment policy subsystem enabled.DISA STIG Apple Mac OSX 10.14 v2r6Unix

CONFIGURATION MANAGEMENT

DB2X-00-002800 - DB2 must limit privileges to change software modules, to include stored procedures, functions and triggers, and links to software external to DB2.DISA STIG IBM DB2 v10.5 LUW v2r1 DatabaseIBM_DB2DB

CONFIGURATION MANAGEMENT

DB2X-00-003100 - Database software, including DBMS configuration files, must be stored in dedicated directories, separate from the host OS and other applicationsDISA STIG IBM DB2 v10.5 LUW v2r1 OS LinuxUnix

CONFIGURATION MANAGEMENT

DB2X-00-008100 - DB2 and the operating system must enforce access restrictions associated with changes to the configuration of DB2 or database(s)DISA STIG IBM DB2 v10.5 LUW v2r1 OS LinuxUnix

CONFIGURATION MANAGEMENT

EP11-00-003200 - Software, applications, and configuration files that are part of, or related to, the Postgres Plus Advanced Server installation must be monitored to discover unauthorized changes.EDB PostgreSQL Advanced Server v11 Windows OS Audit v2r4Windows

CONFIGURATION MANAGEMENT

EP11-00-003300 - The EDB Postgres Advanced Server software installation account must be restricted to authorized users.EDB PostgreSQL Advanced Server v11 DB Audit v2r4PostgreSQLDB

CONFIGURATION MANAGEMENT

ESXI-65-000047 - The ESXi Image Profile and VIB Acceptance Levels must be verified.DISA STIG VMware vSphere ESXi OS 6.5 v2r4Unix

CONFIGURATION MANAGEMENT

EX13-EG-000300 - Exchange software must be monitored for unauthorized changes.DISA Microsoft Exchange 2013 Edge Transport Server STIG v1r6Windows

CONFIGURATION MANAGEMENT

MD3X-00-000250 - MongoDB software installation account must be restricted to authorized users.DISA STIG MongoDB Enterprise Advanced 3.x v2r3 OSUnix

CONFIGURATION MANAGEMENT

Monterey - Configure System to Audit All Failed Change of Object AttributesNIST macOS Monterey v1.0.0 - 800-53r5 ModerateUnix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT, MAINTENANCE

O365-EX-000028 - Trust Bar notification must be enabled for unsigned application add-ins in Excel and blocked.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

CONFIGURATION MANAGEMENT

OL6-00-000008 - Vendor-provided cryptographic certificates must be installed to verify the integrity of system software.DISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL6-00-000015 - The system package management tool must cryptographically verify the authenticity of all software packages during installation.DISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL6-00-000045 - Library files must have mode 0755 or less permissive - '/lib'DISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL6-00-000045 - Library files must have mode 0755 or less permissive - '/lib64'DISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL6-00-000045 - Library files must have mode 0755 or less permissive - '/usr/lib'DISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL6-00-000047 - All system command files must have mode 755 or less permissive - '/usr/local/bin'DISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL6-00-000048 - All system command files must be owned by root - '/usr/bin'DISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL6-00-000048 - All system command files must be owned by root - '/usr/local/sbin'DISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL07-00-040440 - The Oracle Linux operating system must be configured so that the SSH daemon does not permit Kerberos authentication unless needed.DISA Oracle Linux 7 STIG v2r14Unix

CONFIGURATION MANAGEMENT

PGS9-00-000700 - Privileges to change PostgreSQL software modules must be limited.DISA STIG PostgreSQL 9.x on RHEL OS v2r5Unix

CONFIGURATION MANAGEMENT

PGS9-00-001300 - The role(s)/group(s) used to modify database structure (including but not necessarily limited to tables, indexes, storage, etc.) and logic modules (functions, trigger procedures, links to software external to PostgreSQL, etc.) must be restricted to authorized users - s used to modify database structure and logic modules must be restricted to authorized users.DISA STIG PostgreSQL 9.x on RHEL OS v2r5Unix

CONFIGURATION MANAGEMENT

PGS9-00-003100 - Database objects (including but not limited to tables, indexes, storage, trigger procedures, functions, links to software external to PostgreSQL, etc.) must be owned by database/DBMS principals authorized for ownership.DISA STIG PostgreSQL 9.x on RHEL OS v2r5Unix

CONFIGURATION MANAGEMENT

PGS9-00-004100 - PostgreSQL must produce audit records of its enforcement of access restrictions associated with changes to the configuration of PostgreSQL or database(s).DISA STIG PostgreSQL 9.x on RHEL DB v2r5PostgreSQLDB

CONFIGURATION MANAGEMENT

RHEL-06-000008 - Vendor-provided cryptographic certificates must be installed to verify the integrity of system software.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-06-000013 - The system package management tool must cryptographically verify the authenticity of system software packages during installation.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-06-000045 - Library files must have mode 0755 or less permissive - '/usr/lib/*'.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-06-000046 - Library files must be owned by a system account - '/usr/lib64/*'.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-06-000047 - All system command files must have mode 755 or less permissive - '/bin/*'DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-06-000048 - All system command files must be owned by root - /usr/bin/*.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-06-000048 - All system command files must be owned by root - /usr/local/bin/*.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-06-000048 - All system command files must be owned by root - /usr/local/sbin/*.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-07-020050 - The Red Hat Enterprise Linux operating system must prevent the installation of software, patches, service packs, device drivers, or operating system components from a repository without verification they have been digitally signed using a certificate that is issued by a Certificate Authority (CA) that is recognized and approved by the organization.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

CONFIGURATION MANAGEMENT

SQL4-00-015300 - SQL Server security-relevant configuration settings must be monitored to discover unauthorized changes.DISA STIG SQL Server 2014 Instance DB Audit v2r4MS_SQLDB

CONFIGURATION MANAGEMENT

SQL4-00-015620 - In a database owned by a login not having administrative privileges at the instance level, the database property TRUSTWORTHY must be OFF unless required and authorized.DISA STIG SQL Server 2014 Database Audit v1r7MS_SQLDB

CONFIGURATION MANAGEMENT

SQL4-00-033900 - SQL Server and Windows must enforce access restrictions associated with changes to the configuration of the SQL Server instance or database(s) - s.DISA STIG SQL Server 2014 Instance DB Audit v2r4MS_SQLDB

CONFIGURATION MANAGEMENT

SQL4-00-034000 - SQL Server must produce Trace or Audit records of its enforcement of access restrictions associated with changes to the configuration of the DBMS or database(s) - DATABASE_ROLE_MEMBER_CHANGE_GROUPDISA STIG SQL Server 2014 Instance DB Audit v2r4MS_SQLDB

CONFIGURATION MANAGEMENT

SQL4-00-034000 - SQL Server must produce Trace or Audit records of its enforcement of access restrictions associated with changes to the configuration of the DBMS or database(s) - Event ID 152DISA STIG SQL Server 2014 Instance DB Audit v2r4MS_SQLDB

CONFIGURATION MANAGEMENT

SQL4-00-034000 - SQL Server must produce Trace or Audit records of its enforcement of access restrictions associated with changes to the configuration of the DBMS or database(s) - Event ID 153DISA STIG SQL Server 2014 Instance DB Audit v2r4MS_SQLDB

CONFIGURATION MANAGEMENT

SQL4-00-034000 - SQL Server must produce Trace or Audit records of its enforcement of access restrictions associated with changes to the configuration of the DBMS or database(s) - Event ID 175DISA STIG SQL Server 2014 Instance DB Audit v2r4MS_SQLDB

CONFIGURATION MANAGEMENT

SQL4-00-034000 - SQL Server must produce Trace or Audit records of its enforcement of access restrictions associated with changes to the configuration of the DBMS or database(s) - SERVER_STATE_CHANGE_GROUPDISA STIG SQL Server 2014 Instance DB Audit v2r4MS_SQLDB

CONFIGURATION MANAGEMENT

SQL6-D0-001400 - The role(s)/group(s) used to modify database structure (including but not necessarily limited to tables, indexes, storage, etc.) and logic modules (stored procedures, functions, triggers, links to software external to SQL Server, etc.) must be restricted to authorized users.DISA STIG SQL Server 2016 Database Audit v3r1MS_SQLDB

CONFIGURATION MANAGEMENT

SQL6-D0-006700 - SQL Server software installation account must be restricted to authorized users.DISA STIG SQL Server 2016 Instance OS Audit v3r1Windows

CONFIGURATION MANAGEMENT

UBTU-16-011000 - Library files must have mode 0755 or less permissive.DISA STIG Ubuntu 16.04 LTS v2r3Unix

CONFIGURATION MANAGEMENT

UBTU-18-010135 - The Ubuntu operating system library files must be owned by root.DISA STIG Ubuntu 18.04 LTS v2r15Unix

CONFIGURATION MANAGEMENT

UBTU-18-010136 - The Ubuntu operating system library directories must be owned by root.DISA STIG Ubuntu 18.04 LTS v2r15Unix

CONFIGURATION MANAGEMENT

UBTU-18-010138 - The Ubuntu operating system library directories must be group-owned by root.DISA STIG Ubuntu 18.04 LTS v2r15Unix

CONFIGURATION MANAGEMENT

WBLC-03-000125 - Oracle WebLogic must limit privileges to change the software resident within software libraries (including privileged programs).Oracle WebLogic Server 12c Linux v2r1Unix

CONFIGURATION MANAGEMENT