| 1.3 UBTU-24-100020 | CIS Ubuntu Linux 24.04 LTS STIG v1.0.0 CAT III | Unix | CONFIGURATION MANAGEMENT |
| 1.4 UBTU-22-213010 | CIS Ubuntu Linux 22.04 LTS STIG v1.0.0 CAT III | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
| 1.13 UBTU-22-215025 | CIS Ubuntu Linux 22.04 LTS STIG v1.0.0 CAT III | Unix | CONFIGURATION MANAGEMENT |
| 1.21 UBTU-24-100700 | CIS Ubuntu Linux 24.04 LTS STIG v1.0.0 CAT III | Unix | CONFIGURATION MANAGEMENT |
| 1.53 UBTU-22-252020 | CIS Ubuntu Linux 22.04 LTS STIG v1.0.0 CAT III | Unix | AUDIT AND ACCOUNTABILITY |
| 1.82 UBTU-22-412020 | CIS Ubuntu Linux 22.04 LTS STIG v1.0.0 CAT III | Unix | ACCESS CONTROL |
| 1.106 UBTU-24-600140 | CIS Ubuntu Linux 24.04 LTS STIG v1.0.0 CAT III | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
| 1.122 UBTU-22-653025 | CIS Ubuntu Linux 22.04 LTS STIG v1.0.0 CAT III | Unix | AUDIT AND ACCOUNTABILITY |
| 1.124 UBTU-22-653035 | CIS Ubuntu Linux 22.04 LTS STIG v1.0.0 CAT III | Unix | AUDIT AND ACCOUNTABILITY |
| 1.176 UBTU-24-900980 | CIS Ubuntu Linux 24.04 LTS STIG v1.0.0 CAT III | Unix | AUDIT AND ACCOUNTABILITY |
| AIOS-01-080004 - Apple iOS must enforce a minimum password length of six characters. | AirWatch - DISA Apple iOS 10 v1r3 | MDM | IDENTIFICATION AND AUTHENTICATION |
| GEN000450 - The system must limit users to 10 simultaneous system logins in accordance with operational requirements. | DISA STIG AIX 6.1 v1r14 | Unix | ACCESS CONTROL |
| GEN000452 - The system must display the date and time of the last successful account login upon login. | DISA STIG AIX 6.1 v1r14 | Unix | ACCESS CONTROL |
| GEN000510 - The system must display a publicly-viewable pattern during a graphical desktop environment session lock. | DISA STIG AIX 6.1 v1r14 | Unix | ACCESS CONTROL |
| GEN000850 - The system must restrict the ability to switch to the root user to members of a defined group. | DISA STIG AIX 6.1 v1r14 | Unix | ACCESS CONTROL |
| GEN000900 - The root user's home directory must not be the root directory (/). | DISA STIG AIX 6.1 v1r14 | Unix | CONFIGURATION MANAGEMENT |
| GEN001280 - Manual page files must have mode 0644 or less permissive - '/usr/share/info/*' | DISA STIG AIX 6.1 v1r14 | Unix | ACCESS CONTROL |
| GEN001290 - All manual page files must not have extended ACLs - '/usr/share/infopage' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
| GEN001290 - All manual page files must not have extended ACLs - '/usr/share/infopage/*' | DISA STIG AIX 6.1 v1r14 | Unix | ACCESS CONTROL |
| GEN001440 - All interactive users must be assigned a home directory in the /etc/passwd file. | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
| GEN001460 - All interactive user home directories defined in the /etc/passwd file must exist. | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
| GEN001460 - All interactive user home directories defined in the /etc/passwd file must exist. | DISA STIG AIX 6.1 v1r14 | Unix | ACCESS CONTROL |
| GEN001490 - User home directories must not have extended ACLs. | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
| GEN001540 - All files and directories contained in interactive user's home directories must be owned by the home directory's owner. | DISA STIG AIX 6.1 v1r14 | Unix | ACCESS CONTROL |
| GEN001780 - Global initialization files must contain the 'mesg -n' or 'mesg n' commands - '/etc/profile' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | CONFIGURATION MANAGEMENT |
| GEN002260 - The system must be checked for extraneous device files at least weekly. | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | CONFIGURATION MANAGEMENT |
| GEN002260 - The system must be checked for extraneous device files at least weekly. | DISA STIG AIX 6.1 v1r14 | Unix | CONFIGURATION MANAGEMENT |
| GEN002715 - System audit tool executables must be owned by root - '/usr/sbin/audit' | DISA STIG AIX 6.1 v1r14 | Unix | AUDIT AND ACCOUNTABILITY |
| GEN002715 - System audit tool executables must be owned by root - '/usr/sbin/auditcat' | DISA STIG AIX 6.1 v1r14 | Unix | AUDIT AND ACCOUNTABILITY |
| GEN002715 - System audit tool executables must be owned by root - '/usr/sbin/auditstream' | DISA STIG AIX 6.1 v1r14 | Unix | AUDIT AND ACCOUNTABILITY |
| GEN002716 - System audit tool executables must be group-owned by bin, sys, or system - '/usr/sbin/auditselect' | DISA STIG AIX 6.1 v1r14 | Unix | AUDIT AND ACCOUNTABILITY |
| GEN002716 - System audit tool executables must be group-owned by root, bin, sys, or system - '/sbin/aureport' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | AUDIT AND ACCOUNTABILITY |
| GEN002717 - System audit tool executables must have mode 0750 or less permissive - '/sbin/audispd' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | AUDIT AND ACCOUNTABILITY |
| GEN002717 - System audit tool executables must have mode 0750 or less permissive - '/sbin/auditctl' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | AUDIT AND ACCOUNTABILITY |
| GEN002717 - System audit tool executables must have mode 0750 or less permissive - '/usr/sbin/auditmerge' | DISA STIG AIX 6.1 v1r14 | Unix | AUDIT AND ACCOUNTABILITY |
| GEN002717 - System audit tool executables must have mode 0750 or less permissive - '/usr/sbin/auditselect' | DISA STIG AIX 6.1 v1r14 | Unix | AUDIT AND ACCOUNTABILITY |
| GEN002718 - System audit tool executables must not have extended ACLs - '/sbin/audispd' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | AUDIT AND ACCOUNTABILITY |
| GEN002718 - System audit tool executables must not have extended ACLs - '/usr/sbin/auditpr' | DISA STIG AIX 6.1 v1r14 | Unix | AUDIT AND ACCOUNTABILITY |
| GEN003220 - Cron programs must not set the umask to a value less restrictive than 077 - '/etc/cron.monthly/*' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
| GEN003520 - The kernel core dump data directory must be owned by root. | DISA STIG AIX 6.1 v1r14 | Unix | ACCESS CONTROL |
| GEN003523 - The kernel core dump data directory must not have an extended ACL. | DISA STIG AIX 6.1 v1r14 | Unix | ACCESS CONTROL |
| GEN003620 - A separate file system must be used for user home directories (such as /home or equivalent). | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
| GEN003624 - The system must use a separate file system for /tmp (or equivalent). | DISA STIG AIX 6.1 v1r14 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
| GEN003800 - Inetd or xinetd logging/tracing must be enabled. | DISA STIG AIX 6.1 v1r14 | Unix | AUDIT AND ACCOUNTABILITY |
| GEN004680 - The SMTP service must not have the VRFY feature active. | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | CONFIGURATION MANAGEMENT |
| GEN004980 - The FTP daemon must be configured for logging or verbose mode. | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | AUDIT AND ACCOUNTABILITY |
| GEN008460 - The system must have USB disabled unless needed - 'lslpp' | DISA STIG AIX 6.1 v1r14 | Unix | CONFIGURATION MANAGEMENT |
| GEN008480 - The system must have USB Mass Storage disabled unless needed. | DISA STIG AIX 6.1 v1r14 | Unix | CONFIGURATION MANAGEMENT |
| GEN008480 - The system must have USB Mass Storage disabled unless needed. | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | CONFIGURATION MANAGEMENT |
| KNOX-07-000100 - The Samsung Android 7 with Knox must be configured to enforce a minimum password length of six characters. | AirWatch - DISA Samsung Android 7 with Knox 2.x v1r1 | MDM | IDENTIFICATION AND AUTHENTICATION |