AIOS-15-003000 - Apple iOS/iPadOS 15 must not allow backup to remote systems (iCloud). | MobileIron - DISA Apple iOS/iPadOS 14 v1r4 | MDM | SYSTEM AND COMMUNICATIONS PROTECTION |
AIOS-15-003300 - Apple iOS/iPadOS 15 must not allow backup to remote systems (iCloud Keychain). | AirWatch - DISA Apple iOS/iPadOS 14 v1r4 | MDM | SYSTEM AND COMMUNICATIONS PROTECTION |
AIOS-15-003400 - Apple iOS/iPadOS 15 must not allow backup to remote systems (My Photo Stream). | MobileIron - DISA Apple iOS/iPadOS 14 v1r4 | MDM | SYSTEM AND COMMUNICATIONS PROTECTION |
AIOS-15-003700 - Apple iOS/iPadOS 15 must not allow backup to remote systems (enterprise books). | MobileIron - DISA Apple iOS/iPadOS 14 v1r4 | MDM | SYSTEM AND COMMUNICATIONS PROTECTION |
AIOS-15-009200 - Apple iOS/iPadOS 15 must be configured to not allow backup of [all applications, configuration data] to locally connected systems. | AirWatch - DISA Apple iOS/iPadOS 14 v1r4 | MDM | SYSTEM AND COMMUNICATIONS PROTECTION |
AIOS-16-009200 - Apple iOS/iPadOS 16 must be configured to not allow backup of [all applications, configuration data] to locally connected systems. | AirWatch - DISA Apple iOS/iPadOS 16 v2r1 | MDM | SYSTEM AND COMMUNICATIONS PROTECTION |
AIOS-17-709200 - Apple iOS/iPadOS 17 must be configured to not allow backup of [all applications, configuration data] to locally connected systems. | MobileIron - DISA Apple iOS/iPadOS BYOAD 17 v1r1 | MDM | SYSTEM AND COMMUNICATIONS PROTECTION |
AIOS-18-003200 - Apple iOS/iPadOS 18 must not allow backup to remote systems (iCloud document and data synchronization) - iCloud document and data synchronization. | MobileIron - DISA Apple iOS/iPadOS 18 v1r1 | MDM | SYSTEM AND COMMUNICATIONS PROTECTION |
AIOS-18-003300 - Apple iOS/iPadOS 18 must not allow backup to remote systems (iCloud Keychain) - iCloud Keychain. | MobileIron - DISA Apple iOS/iPadOS 18 v1r1 | MDM | SYSTEM AND COMMUNICATIONS PROTECTION |
AIOS-18-003450 - Apple iOS/iPadOS 18 must not allow backup to remote systems (Cloud Photo Library) - Cloud Photo Library. | AirWatch - DISA Apple iOS/iPadOS 18 v1r1 | MDM | SYSTEM AND COMMUNICATIONS PROTECTION |
AIOS-18-003700 - Apple iOS/iPadOS 18 must not allow backup to remote systems (enterprise books) - enterprise books. | AirWatch - DISA Apple iOS/iPadOS 18 v1r1 | MDM | SYSTEM AND COMMUNICATIONS PROTECTION |
AIOS-18-013300 - Apple iOS/iPadOS 18 must disable 'Allow USB drive access in Files app' if the authorizing official (AO) has not approved the use of DOD-approved USB storage drives with iOS/iPadOS devices - Allow USB drive access in Files app if the Authorizing Official (AO) has not approved the use of DoD-approved USB storage drives with iOS/iPadOS devices. | MobileIron - DISA Apple iOS/iPadOS 18 v1r1 | MDM | SYSTEM AND COMMUNICATIONS PROTECTION |
ALMA-09-042150 - Any AlmaLinux OS 9 world-writable directories must be owned by root, sys, bin, or an application user. | DISA CloudLinux AlmaLinux OS 9 STIG v1r1 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
ALMA-09-042260 - A sticky bit must be set on all AlmaLinux OS 9 public directories. | DISA CloudLinux AlmaLinux OS 9 STIG v1r1 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
GOOG-12-008500 - Google Android 12 must be configured to not allow backup of [all applications, configuration data] to locally connected systems. | AirWatch - DISA Google Android 12 COBO v1r2 | MDM | SYSTEM AND COMMUNICATIONS PROTECTION |
GOOG-12-008500 - Google Android 12 must be configured to not allow backup of [all applications, configuration data] to locally connected systems. | MobileIron - DISA Google Android 12 COBO v1r2 | MDM | SYSTEM AND COMMUNICATIONS PROTECTION |
GOOG-12-008600 - Google Android 12 must be configured to not allow backup of [all applications, configuration data] to remote systems. | AirWatch - DISA Google Android 12 COPE v1r2 | MDM | SYSTEM AND COMMUNICATIONS PROTECTION |
GOOG-12-008600 - Google Android 12 must be configured to not allow backup of [all applications, configuration data] to remote systems. | MobileIron - DISA Google Android 12 COPE v1r2 | MDM | SYSTEM AND COMMUNICATIONS PROTECTION |
GOOG-13-008500 - Google Android 13 must be configured to not allow backup of [all applications, configuration data] to locally connected systems. | AirWatch - DISA Google Android 13 COPE v2r1 | MDM | SYSTEM AND COMMUNICATIONS PROTECTION |
GOOG-13-008600 - Google Android 13 must be configured to not allow backup of [all applications, configuration data] to remote systems. | AirWatch - DISA Google Android 13 COBO v2r1 | MDM | SYSTEM AND COMMUNICATIONS PROTECTION |
GOOG-13-008600 - Google Android 13 must be configured to not allow backup of [all applications, configuration data] to remote systems. | MobileIron - DISA Google Android 13 COBO v2r1 | MDM | SYSTEM AND COMMUNICATIONS PROTECTION |
GOOG-13-012400 - Google Android 13 must allow only the Administrator (MDM) to perform the following management function: Disable Phone Hub. | AirWatch - DISA Google Android 13 COPE v2r1 | MDM | SYSTEM AND COMMUNICATIONS PROTECTION |
GOOG-13-012400 - Google Android 13 must allow only the Administrator (MDM) to perform the following management function: Disable Phone Hub. | MobileIron - DISA Google Android 13 COPE v2r1 | MDM | SYSTEM AND COMMUNICATIONS PROTECTION |
GOOG-13-708600 - Google Android 13 must be configured to not allow backup of all work profile applications to remote systems. | MobileIron - DISA Google Android 13 BYOD v1r2 | MDM | SYSTEM AND COMMUNICATIONS PROTECTION |
GOOG-13-708600 - Google Android 13 must be configured to not allow backup of all work profile applications to remote systems. | AirWatch - DISA Google Android 13 BYOD v1r2 | MDM | SYSTEM AND COMMUNICATIONS PROTECTION |
GOOG-14-008500 - Google Android 14 must be configured to not allow backup of [all applications, configuration data] to locally connected systems. | AirWatch - DISA Google Android 14 COBO v2r1 | MDM | SYSTEM AND COMMUNICATIONS PROTECTION |
GOOG-14-008600 - Google Android 14 must be configured to not allow backup of [all applications, configuration data] to remote systems. | MobileIron - DISA Google Android 14 COBO v2r1 | MDM | SYSTEM AND COMMUNICATIONS PROTECTION |
GOOG-14-012400 - Google Android 14 must allow only the administrator (MDM) to perform the following management function: Disable Phone Hub - MDM to perform the following management function: Disable Phone Hub. | AirWatch - DISA Google Android 14 COBO v2r1 | MDM | SYSTEM AND COMMUNICATIONS PROTECTION |
GOOG-14-708600 - Google Android 14 must be configured to not allow backup of all work profile applications to remote systems. | MobileIron - DISA Google Android 14 BYOAD v1r1 | MDM | SYSTEM AND COMMUNICATIONS PROTECTION |
MADB-10-005600 - Access to database files must be limited to relevant processes and to authorized, administrative users. | DISA MariaDB Enterprise 10.x v2r2 DB | MySQLDB | SYSTEM AND COMMUNICATIONS PROTECTION |
MSFT-11-003900 - Microsoft Android 11 must be configured to not allow backup of all applications and configuration data to remote systems. | AirWatch - DISA Microsoft Android 11 COPE v1r2 | MDM | SYSTEM AND COMMUNICATIONS PROTECTION |
OL08-00-010190 - A sticky bit must be set on all OL 8 public directories to prevent unauthorized and unintended information transferred via shared system resources. | DISA Oracle Linux 8 STIG v2r2 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
PHTN-40-000067 The Photon operating system must restrict access to the kernel message buffer. | DISA VMware vSphere 8.0 vCenter Appliance Photon OS 4.0 STIG v2r1 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
RHEL-07-010375 - The Red Hat Enterprise Linux operating system must restrict access to the kernel message buffer. | DISA Red Hat Enterprise Linux 7 STIG v3r15 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
RHEL-08-010190 - A sticky bit must be set on all RHEL 8 public directories to prevent unauthorized and unintended information transferred via shared system resources. | DISA Red Hat Enterprise Linux 8 STIG v2r1 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
RHEL-08-010375 - RHEL 8 must restrict access to the kernel message buffer. | DISA Red Hat Enterprise Linux 8 STIG v2r1 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
RHEL-09-232245 - A sticky bit must be set on all RHEL 9 public directories. | DISA Red Hat Enterprise Linux 9 STIG v2r3 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
SLES-12-010375 - The SUSE operating system must restrict access to the kernel message buffer. | DISA SLES 12 STIG v3r1 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
SLES-15-010300 - The sticky bit must be set on all SUSE operating system world-writable directories. | DISA SLES 15 STIG v2r2 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
SLES-15-010375 - The SUSE operating system must restrict access to the kernel message buffer. | DISA SLES 15 STIG v2r2 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
UBTU-22-213010 - Ubuntu 22.04 LTS must restrict access to the kernel message buffer. | DISA Canonical Ubuntu 22.04 LTS STIG v2r3 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
UBTU-22-232145 - Ubuntu 22.04 LTS must set a sticky bit on all public directories to prevent unauthorized and unintended information transferred via shared system resources. | DISA Canonical Ubuntu 22.04 LTS STIG v2r3 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
UBTU-24-600150 - Ubuntu 24.04 LTS must set a sticky bit on all public directories to prevent unauthorized and unintended information transferred via shared system resources. | DISA Canonical Ubuntu 24.04 LTS STIG v1r1 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
VCPG-67-000018 - Data from the vPostgres database must be protected from unauthorized transfer. | DISA STIG VMware vSphere 6.7 PostgreSQL v1r2 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
WN11-00-000060 - Non-system-created file shares on a system must limit access to groups that require it. | DISA Windows 11 STIG v2r2 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
WN11-CC-000275 - Local drives must be prevented from sharing with Remote Desktop Session Hosts. | DISA Windows 11 STIG v2r2 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
WN22-00-000230 - Windows Server 2022 nonsystem-created file shares must limit access to groups that require it. | DISA Microsoft Windows Server 2022 STIG v2r3 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
WN22-CC-000350 - Windows Server 2022 Remote Desktop Services must prevent drive redirection. | DISA Microsoft Windows Server 2022 STIG v2r3 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
WN22-DC-000120 - Windows Server 2022 data files owned by users must be on a different logical partition from the directory server data files. | DISA Microsoft Windows Server 2022 STIG v2r3 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
WN22-SO-000250 - Windows Server 2022 must restrict anonymous access to Named Pipes and Shares. | DISA Microsoft Windows Server 2022 STIG v2r3 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |