Item Search

NameAudit NamePluginCategory
ALMA-09-006400 - AlmaLinux OS 9 must require a unique superuser's name upon booting into single-user and maintenance modes.DISA CloudLinux AlmaLinux OS 9 STIG v1r1Unix

ACCESS CONTROL

ALMA-09-006510 - AlmaLinux OS 9 must require authentication to access single-user mode.DISA CloudLinux AlmaLinux OS 9 STIG v1r1Unix

ACCESS CONTROL

APPL-14-000033 The macOS system must disable FileVault automatic log on.DISA Apple macOS 14 (Sonoma) STIG v2r3Unix

ACCESS CONTROL

APPL-14-002001 The macOS system must disable Server Message Block sharing.DISA Apple macOS 14 (Sonoma) STIG v2r3Unix

ACCESS CONTROL

APPL-14-005070 The macOS system must enable Authenticated Root.DISA Apple macOS 14 (Sonoma) STIG v2r3Unix

ACCESS CONTROL

APPL-15-000033 - The macOS system must disable FileVault automatic login.DISA Apple macOS 15 (Sequoia) STIG v1r2Unix

ACCESS CONTROL

APPL-15-002100 - The macOS system must disable Media Sharing.DISA Apple macOS 15 (Sequoia) STIG v1r2Unix

ACCESS CONTROL

APPL-15-005070 - The macOS system must enable Authenticated Root.DISA Apple macOS 15 (Sequoia) STIG v1r2Unix

ACCESS CONTROL

CNTR-K8-000320 - The Kubernetes API server must have the insecure port flag disabled.DISA STIG Kubernetes v2r2Unix

ACCESS CONTROL

CNTR-K8-000460 - Kubernetes DynamicKubeletConfig must not be enabled - manifestDISA STIG Kubernetes v2r2Unix

ACCESS CONTROL

CNTR-K8-000470 - The Kubernetes API server must have Alpha APIs disabled.DISA STIG Kubernetes v2r2Unix

ACCESS CONTROL

CNTR-R2-000130 The Kubernetes Kubelet must have the read-only port flag disabled.DISA Rancher Government Solutions RKE2 STIG v2r2Unix

ACCESS CONTROL

CNTR-R2-000140 The Kubernetes API server must have the insecure bind address not set.DISA Rancher Government Solutions RKE2 STIG v2r2Unix

ACCESS CONTROL

CNTR-R2-000160 The Kubernetes API server must have anonymous authentication disabled.DISA Rancher Government Solutions RKE2 STIG v2r2Unix

ACCESS CONTROL

EX19-ED-000016 - Exchange servers must use approved DOD certificates.DISA Microsoft Exchange 2019 Edge Server STIG v2r2Windows

ACCESS CONTROL

JUEX-NM-000060 - The Juniper EX switch must be configured to assign appropriate user roles or access levels to authenticated users.DISA Juniper EX Series Network Device Management v2r2Juniper

ACCESS CONTROL

MADB-10-000300 - MariaDB must enforce approved authorizations for logical access to information and system resources in accordance with applicable access control policies.DISA MariaDB Enterprise 10.x v2r2 DBMySQLDB

ACCESS CONTROL

MD7X-00-000300 MongoDB must enforce approved authorizations for logical access to information and system resources in accordance with applicable access control policies.DISA MongoDB Enterprise Advanced 7.x STIG v1r1MongoDB

ACCESS CONTROL

OL08-00-010149 - OL 8 operating systems booted with a BIOS must have a unique name for the grub superusers account when booting into single-user and maintenance modes.DISA Oracle Linux 8 STIG v2r2Unix

ACCESS CONTROL

OL08-00-010150 - OL 8 operating systems booted with a BIOS must require authentication upon booting into single-user and maintenance modes.DISA Oracle Linux 8 STIG v2r2Unix

ACCESS CONTROL

OL08-00-010151 - OL 8 operating systems must require authentication upon booting into rescue mode.DISA Oracle Linux 8 STIG v2r2Unix

ACCESS CONTROL

PHTN-30-000031 - The Photon operating system must require authentication upon booting into single-user and maintenance modes.DISA STIG VMware vSphere 7.0 Photon OS v1r4Unix

ACCESS CONTROL

RHEL-08-010140 - RHEL 8 operating systems booted with United Extensible Firmware Interface (UEFI) must require authentication upon booting into single-user mode and maintenance.DISA Red Hat Enterprise Linux 8 STIG v2r1Unix

ACCESS CONTROL

RHEL-08-010141 - RHEL 8 operating systems booted with United Extensible Firmware Interface (UEFI) must require a unique superusers name upon booting into single-user mode and maintenance.DISA Red Hat Enterprise Linux 8 STIG v2r1Unix

ACCESS CONTROL

RHEL-08-010151 - RHEL 8 operating systems must require authentication upon booting into rescue mode.DISA Red Hat Enterprise Linux 8 STIG v2r1Unix

ACCESS CONTROL

RHEL-08-010152 - RHEL 8 operating systems must require authentication upon booting into emergency mode.DISA Red Hat Enterprise Linux 8 STIG v2r1Unix

ACCESS CONTROL

RHEL-09-212020 - RHEL 9 must require a unique superusers name upon booting into single-user and maintenance modes.DISA Red Hat Enterprise Linux 9 STIG v2r3Unix

ACCESS CONTROL

RHEL-09-611200 - RHEL 9 must require authentication to access single-user mode.DISA Red Hat Enterprise Linux 9 STIG v2r3Unix

ACCESS CONTROL

SLES-15-010190 - SUSE operating systems with a basic input/output system (BIOS) must require authentication upon booting into single-user and maintenance modes.DISA SLES 15 STIG v2r2Unix

ACCESS CONTROL

SLES-15-010200 - SUSE operating systems with Unified Extensible Firmware Interface (UEFI) implemented must require authentication upon booting into single-user mode and maintenance.DISA SLES 15 STIG v2r2Unix

ACCESS CONTROL

UBTU-20-010009 - Ubuntu operating systems when booted must require authentication upon booting into single-user and maintenance modes.DISA STIG Ubuntu 20.04 LTS v2r1Unix

ACCESS CONTROL

UBTU-22-212010 - Ubuntu 22.04 LTS, when booted, must require authentication upon booting into single-user and maintenance modes.DISA Canonical Ubuntu 22.04 LTS STIG v2r3Unix

ACCESS CONTROL

VCLU-80-000130 The vCenter Lookup service DefaultServlet must be set to 'readonly' for 'PUT' and 'DELETE' commands.DISA VMware vSphere 8.0 vCenter Appliance Lookup Service STIG v2r1Unix

ACCESS CONTROL

VCPF-80-000005 The vCenter Perfcharts service cookies must have secure flag set.DISA VMware vSphere 8.0 vCenter Appliance Perfcharts STIG v2r1Unix

ACCESS CONTROL

VCPF-80-000130 The vCenter Perfcharts service DefaultServlet must be set to 'readonly' for 'PUT' and 'DELETE' commands.DISA VMware vSphere 8.0 vCenter Appliance Perfcharts STIG v2r1Unix

ACCESS CONTROL

WBSP-AS-000211 - The WebSphere Application Server Java 2 security must be enabled.DISA IBM WebSphere Traditional 9 STIG v1r1Unix

ACCESS CONTROL

WBSP-AS-000211 - The WebSphere Application Server Java 2 security must be enabled.DISA IBM WebSphere Traditional 9 STIG v1r1 MiddlewareUnix

ACCESS CONTROL

WBSP-AS-000211 - The WebSphere Application Server Java 2 security must be enabled.DISA IBM WebSphere Traditional 9 Windows STIG v1r1Windows

ACCESS CONTROL

WBSP-AS-000212 - The WebSphere Application Server Java 2 security must not be bypassed.DISA IBM WebSphere Traditional 9 Windows STIG v1r1Windows

ACCESS CONTROL

WN11-UR-000010 - The 'Access this computer from the network' user right must only be assigned to the Administrators and Remote Desktop Users groups.DISA Windows 11 STIG v2r2Windows

ACCESS CONTROL

WN11-UR-000025 - The 'Allow log on locally' user right must only be assigned to the Administrators and Users groups.DISA Windows 11 STIG v2r2Windows

ACCESS CONTROL

WN11-UR-000075 - The 'Deny log on as a batch job' user right on domain-joined workstations must be configured to prevent access from highly privileged domain accounts.DISA Windows 11 STIG v2r2Windows

ACCESS CONTROL

WN22-00-000130 - Windows Server 2022 local volumes must use a format that supports NTFS attributes.DISA Microsoft Windows Server 2022 STIG v2r3Windows

ACCESS CONTROL

WN22-DC-000340 - Windows Server 2022 Access this computer from the network user right must only be assigned to the Administrators, Authenticated Users, and Enterprise Domain Controllers groups on domain controllers.DISA Microsoft Windows Server 2022 STIG v2r3Windows

ACCESS CONTROL

WN22-DC-000360 - Windows Server 2022 Allow log on through Remote Desktop Services user right must only be assigned to the Administrators group on domain controllers.DISA Microsoft Windows Server 2022 STIG v2r3Windows

ACCESS CONTROL

WN22-DC-000390 - Windows Server 2022 Deny log on as a service user right must be configured to include no accounts or groups (blank) on domain controllers.DISA Microsoft Windows Server 2022 STIG v2r3Windows

ACCESS CONTROL

WN22-MS-000080 - Windows Server 2022 Deny access to this computer from the network user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts and local accounts and from unauthenticated access on all systems.DISA Microsoft Windows Server 2022 STIG v2r3Windows

ACCESS CONTROL

WN22-MS-000100 - Windows Server 2022 Deny log on as a service user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts. No other groups or accounts must be assigned this right.DISA Microsoft Windows Server 2022 STIG v2r3Windows

ACCESS CONTROL

WN22-MS-000110 - Windows Server 2022 Deny log on locally user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts and from unauthenticated access on all systems.DISA Microsoft Windows Server 2022 STIG v2r3Windows

ACCESS CONTROL

WN22-UR-000030 - Windows Server 2022 Allow log on locally user right must only be assigned to the Administrators group.DISA Microsoft Windows Server 2022 STIG v2r3Windows

ACCESS CONTROL