Item Search

NameAudit NamePluginCategory
AIOS-01-080004 - Apple iOS must enforce a minimum password length of six characters.MobileIron - DISA Apple iOS 10 v1r3MDM

IDENTIFICATION AND AUTHENTICATION

EDGE-00-000042 - Extensions that are approved for use must be allowlisted if used.DISA STIG Edge v2r1Windows

CONFIGURATION MANAGEMENT

GEN000380 - All GIDs referenced in the /etc/passwd file must be defined in the /etc/group file.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

CONFIGURATION MANAGEMENT

GEN000510 - The system must display a publicly-viewable pattern during a graphical desktop environment session lock.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN000850 - The system must restrict the ability to switch to the root user to members of a defined group.DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN000900 - The root user's home directory must not be the root directory (/).DISA STIG AIX 6.1 v1r14Unix

CONFIGURATION MANAGEMENT

GEN001080 - The root shell must be located in the / file system.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

CONFIGURATION MANAGEMENT

GEN001280 - Manual page files must have mode 0644 or less permissive - '/usr/share/infopage/*'DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN001280 - Manual page files must have mode 0644 or less permissive - '/usr/share/man/*'DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN001290 - All manual page files must not have extended ACLs - '/usr/share/infopage/*'DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN001290 - All manual page files must not have extended ACLs - '/usr/share/man'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN001375 - For systems using DNS resolution, at least two name servers must be configuredDISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

SYSTEM AND COMMUNICATIONS PROTECTION

GEN001375 - For systems using DNS resolution, at least two name servers must be configured - first name serverDISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

SYSTEM AND COMMUNICATIONS PROTECTION

GEN001550 - Files and directories in user home directories must be group-owned by a group of which the home directory's owner is a member.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN001780 - Global initialization files must contain the 'mesg -n' or 'mesg n' commands - '/etc/csh.cshrc'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

CONFIGURATION MANAGEMENT

GEN001780 - Global initialization files must contain the 'mesg -n' or 'mesg n' commands - '/etc/csh.login'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

CONFIGURATION MANAGEMENT

GEN001780 - Global initialization files must contain the 'mesg -n' or 'mesg n' commands - '/etc/environment'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

CONFIGURATION MANAGEMENT

GEN002715 - System audit tool executables must be owned by root - '/sbin/auditctl'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

AUDIT AND ACCOUNTABILITY

GEN002716 - System audit tool executables must be group-owned by bin, sys, or system - '/usr/sbin/auditbin'DISA STIG AIX 6.1 v1r14Unix

AUDIT AND ACCOUNTABILITY

GEN002716 - System audit tool executables must be group-owned by bin, sys, or system - '/usr/sbin/auditcat'DISA STIG AIX 6.1 v1r14Unix

AUDIT AND ACCOUNTABILITY

GEN002716 - System audit tool executables must be group-owned by bin, sys, or system - '/usr/sbin/auditconv'DISA STIG AIX 6.1 v1r14Unix

AUDIT AND ACCOUNTABILITY

GEN002716 - System audit tool executables must be group-owned by bin, sys, or system - '/usr/sbin/auditmerge'DISA STIG AIX 6.1 v1r14Unix

AUDIT AND ACCOUNTABILITY

GEN002716 - System audit tool executables must be group-owned by root, bin, sys, or system - '/sbin/auditd'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

AUDIT AND ACCOUNTABILITY

GEN002716 - System audit tool executables must be group-owned by root, bin, sys, or system - '/sbin/ausearch'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

AUDIT AND ACCOUNTABILITY

GEN002716 - System audit tool executables must be group-owned by root, bin, sys, or system - '/sbin/autrace'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

AUDIT AND ACCOUNTABILITY

GEN002717 - System audit tool executables must have mode 0750 or less permissive - '/sbin/aureport'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

AUDIT AND ACCOUNTABILITY

GEN002717 - System audit tool executables must have mode 0750 or less permissive - '/sbin/ausearch'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

AUDIT AND ACCOUNTABILITY

GEN002717 - System audit tool executables must have mode 0750 or less permissive - '/sbin/autrace'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

AUDIT AND ACCOUNTABILITY

GEN002717 - System audit tool executables must have mode 0750 or less permissive - '/usr/sbin/audit'DISA STIG AIX 6.1 v1r14Unix

AUDIT AND ACCOUNTABILITY

GEN002718 - System audit tool executables must not have extended ACLs - '/sbin/auditd'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

AUDIT AND ACCOUNTABILITY

GEN002718 - System audit tool executables must not have extended ACLs - '/usr/sbin/auditcat'DISA STIG AIX 6.1 v1r14Unix

AUDIT AND ACCOUNTABILITY

GEN002718 - System audit tool executables must not have extended ACLs - '/usr/sbin/auditconv'DISA STIG AIX 6.1 v1r14Unix

AUDIT AND ACCOUNTABILITY

GEN002718 - System audit tool executables must not have extended ACLs - '/usr/sbin/auditstream'DISA STIG AIX 6.1 v1r14Unix

AUDIT AND ACCOUNTABILITY

GEN003220 - Cron programs must not set the umask to a value less restrictive than 077 - '/etc/cron.d/*'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN003220 - Cron programs must not set the umask to a value less restrictive than 077 - '/etc/cron.hourly/*'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN003521 - The kernel core dump data directory must be group-owned by bin, sys, or system.DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN003522 - The kernel core dump data directory must have mode 0700 or less permissive.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN003623 - The system must use a separate file system for the system audit data path.DISA STIG AIX 6.1 v1r14Unix

SYSTEM AND COMMUNICATIONS PROTECTION

GEN003800 - Xinetd logging/tracing must be enabled - '/etc/xinetd.conf log_on_failure'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

AUDIT AND ACCOUNTABILITY

GEN003800 - Xinetd logging/tracing must be enabled - '/etc/xinetd.conf log_on_success'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

AUDIT AND ACCOUNTABILITY

GEN003800 - Xinetd logging/tracing must be enabled - '/etc/xinetd.d/* log_on_failure'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

AUDIT AND ACCOUNTABILITY

GEN004700 - The Sendmail service must not have the wizard backdoor active.DISA STIG AIX 6.1 v1r14Unix

CONFIGURATION MANAGEMENT

GEN005533 - The SSH daemon must limit connections to a single session.DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN005760 - The NFS export configuration file must have mode 0644 or less permissive.DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN006570 - The file integrity tool must be configured to verify ACLs.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

SYSTEM AND INFORMATION INTEGRITY

GEN006571 - The file integrity tool must be configured to verify extended attributes.DISA STIG AIX 6.1 v1r14Unix

SYSTEM AND INFORMATION INTEGRITY

OL08-00-020130 - OL 8 must enforce password complexity by requiring that at least one numeric character be used.DISA Oracle Linux 8 STIG v2r1Unix

IDENTIFICATION AND AUTHENTICATION

OL08-00-020280 - All OL 8 passwords must contain at least one special character.DISA Oracle Linux 8 STIG v2r1Unix

IDENTIFICATION AND AUTHENTICATION

SPLK-CL-000340 - Splunk Enterprise must be configured to enforce password complexity by requiring that at least one uppercase character be used.DISA STIG Splunk Enterprise 8.x for Linux v2r1 STIG OSUnix

IDENTIFICATION AND AUTHENTICATION

SPLK-CL-000370 - Splunk Enterprise must be configured to enforce a minimum 15-character password length.DISA STIG Splunk Enterprise 8.x for Linux v2r1 STIG OSUnix

IDENTIFICATION AND AUTHENTICATION