Item Search

NameAudit NamePluginCategory
AIOS-15-003000 - Apple iOS/iPadOS 15 must not allow backup to remote systems (iCloud).MobileIron - DISA Apple iOS/iPadOS 14 v1r4MDM

SYSTEM AND COMMUNICATIONS PROTECTION

AIOS-15-003300 - Apple iOS/iPadOS 15 must not allow backup to remote systems (iCloud Keychain).AirWatch - DISA Apple iOS/iPadOS 14 v1r4MDM

SYSTEM AND COMMUNICATIONS PROTECTION

AIOS-15-003400 - Apple iOS/iPadOS 15 must not allow backup to remote systems (My Photo Stream).MobileIron - DISA Apple iOS/iPadOS 14 v1r4MDM

SYSTEM AND COMMUNICATIONS PROTECTION

AIOS-15-003700 - Apple iOS/iPadOS 15 must not allow backup to remote systems (enterprise books).MobileIron - DISA Apple iOS/iPadOS 14 v1r4MDM

SYSTEM AND COMMUNICATIONS PROTECTION

AIOS-15-009200 - Apple iOS/iPadOS 15 must be configured to not allow backup of [all applications, configuration data] to locally connected systems.AirWatch - DISA Apple iOS/iPadOS 14 v1r4MDM

SYSTEM AND COMMUNICATIONS PROTECTION

AIOS-16-009200 - Apple iOS/iPadOS 16 must be configured to not allow backup of [all applications, configuration data] to locally connected systems.AirWatch - DISA Apple iOS/iPadOS 16 v2r1MDM

SYSTEM AND COMMUNICATIONS PROTECTION

AIOS-17-709200 - Apple iOS/iPadOS 17 must be configured to not allow backup of [all applications, configuration data] to locally connected systems.MobileIron - DISA Apple iOS/iPadOS BYOAD 17 v1r1MDM

SYSTEM AND COMMUNICATIONS PROTECTION

AIOS-18-003200 - Apple iOS/iPadOS 18 must not allow backup to remote systems (iCloud document and data synchronization) - iCloud document and data synchronization.MobileIron - DISA Apple iOS/iPadOS 18 v1r1MDM

SYSTEM AND COMMUNICATIONS PROTECTION

AIOS-18-003300 - Apple iOS/iPadOS 18 must not allow backup to remote systems (iCloud Keychain) - iCloud Keychain.MobileIron - DISA Apple iOS/iPadOS 18 v1r1MDM

SYSTEM AND COMMUNICATIONS PROTECTION

AIOS-18-003450 - Apple iOS/iPadOS 18 must not allow backup to remote systems (Cloud Photo Library) - Cloud Photo Library.AirWatch - DISA Apple iOS/iPadOS 18 v1r1MDM

SYSTEM AND COMMUNICATIONS PROTECTION

AIOS-18-003700 - Apple iOS/iPadOS 18 must not allow backup to remote systems (enterprise books) - enterprise books.AirWatch - DISA Apple iOS/iPadOS 18 v1r1MDM

SYSTEM AND COMMUNICATIONS PROTECTION

AIOS-18-013300 - Apple iOS/iPadOS 18 must disable 'Allow USB drive access in Files app' if the authorizing official (AO) has not approved the use of DOD-approved USB storage drives with iOS/iPadOS devices - Allow USB drive access in Files app if the Authorizing Official (AO) has not approved the use of DoD-approved USB storage drives with iOS/iPadOS devices.MobileIron - DISA Apple iOS/iPadOS 18 v1r1MDM

SYSTEM AND COMMUNICATIONS PROTECTION

ALMA-09-042150 - Any AlmaLinux OS 9 world-writable directories must be owned by root, sys, bin, or an application user.DISA CloudLinux AlmaLinux OS 9 STIG v1r1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

ALMA-09-042260 - A sticky bit must be set on all AlmaLinux OS 9 public directories.DISA CloudLinux AlmaLinux OS 9 STIG v1r1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

GOOG-12-008500 - Google Android 12 must be configured to not allow backup of [all applications, configuration data] to locally connected systems.AirWatch - DISA Google Android 12 COBO v1r2MDM

SYSTEM AND COMMUNICATIONS PROTECTION

GOOG-12-008500 - Google Android 12 must be configured to not allow backup of [all applications, configuration data] to locally connected systems.MobileIron - DISA Google Android 12 COBO v1r2MDM

SYSTEM AND COMMUNICATIONS PROTECTION

GOOG-12-008600 - Google Android 12 must be configured to not allow backup of [all applications, configuration data] to remote systems.AirWatch - DISA Google Android 12 COPE v1r2MDM

SYSTEM AND COMMUNICATIONS PROTECTION

GOOG-12-008600 - Google Android 12 must be configured to not allow backup of [all applications, configuration data] to remote systems.MobileIron - DISA Google Android 12 COPE v1r2MDM

SYSTEM AND COMMUNICATIONS PROTECTION

GOOG-13-008500 - Google Android 13 must be configured to not allow backup of [all applications, configuration data] to locally connected systems.AirWatch - DISA Google Android 13 COPE v2r1MDM

SYSTEM AND COMMUNICATIONS PROTECTION

GOOG-13-008600 - Google Android 13 must be configured to not allow backup of [all applications, configuration data] to remote systems.AirWatch - DISA Google Android 13 COBO v2r1MDM

SYSTEM AND COMMUNICATIONS PROTECTION

GOOG-13-008600 - Google Android 13 must be configured to not allow backup of [all applications, configuration data] to remote systems.MobileIron - DISA Google Android 13 COBO v2r1MDM

SYSTEM AND COMMUNICATIONS PROTECTION

GOOG-13-012400 - Google Android 13 must allow only the Administrator (MDM) to perform the following management function: Disable Phone Hub.AirWatch - DISA Google Android 13 COPE v2r1MDM

SYSTEM AND COMMUNICATIONS PROTECTION

GOOG-13-012400 - Google Android 13 must allow only the Administrator (MDM) to perform the following management function: Disable Phone Hub.MobileIron - DISA Google Android 13 COPE v2r1MDM

SYSTEM AND COMMUNICATIONS PROTECTION

GOOG-13-708600 - Google Android 13 must be configured to not allow backup of all work profile applications to remote systems.MobileIron - DISA Google Android 13 BYOD v1r2MDM

SYSTEM AND COMMUNICATIONS PROTECTION

GOOG-13-708600 - Google Android 13 must be configured to not allow backup of all work profile applications to remote systems.AirWatch - DISA Google Android 13 BYOD v1r2MDM

SYSTEM AND COMMUNICATIONS PROTECTION

GOOG-14-008500 - Google Android 14 must be configured to not allow backup of [all applications, configuration data] to locally connected systems.AirWatch - DISA Google Android 14 COBO v2r1MDM

SYSTEM AND COMMUNICATIONS PROTECTION

GOOG-14-008600 - Google Android 14 must be configured to not allow backup of [all applications, configuration data] to remote systems.MobileIron - DISA Google Android 14 COBO v2r1MDM

SYSTEM AND COMMUNICATIONS PROTECTION

GOOG-14-012400 - Google Android 14 must allow only the administrator (MDM) to perform the following management function: Disable Phone Hub - MDM to perform the following management function: Disable Phone Hub.AirWatch - DISA Google Android 14 COBO v2r1MDM

SYSTEM AND COMMUNICATIONS PROTECTION

GOOG-14-708600 - Google Android 14 must be configured to not allow backup of all work profile applications to remote systems.MobileIron - DISA Google Android 14 BYOAD v1r1MDM

SYSTEM AND COMMUNICATIONS PROTECTION

MADB-10-005600 - Access to database files must be limited to relevant processes and to authorized, administrative users.DISA MariaDB Enterprise 10.x v2r2 DBMySQLDB

SYSTEM AND COMMUNICATIONS PROTECTION

MSFT-11-003900 - Microsoft Android 11 must be configured to not allow backup of all applications and configuration data to remote systems.AirWatch - DISA Microsoft Android 11 COPE v1r2MDM

SYSTEM AND COMMUNICATIONS PROTECTION

OL08-00-010190 - A sticky bit must be set on all OL 8 public directories to prevent unauthorized and unintended information transferred via shared system resources.DISA Oracle Linux 8 STIG v2r2Unix

SYSTEM AND COMMUNICATIONS PROTECTION

PHTN-40-000067 The Photon operating system must restrict access to the kernel message buffer.DISA VMware vSphere 8.0 vCenter Appliance Photon OS 4.0 STIG v2r1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

RHEL-07-010375 - The Red Hat Enterprise Linux operating system must restrict access to the kernel message buffer.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

SYSTEM AND COMMUNICATIONS PROTECTION

RHEL-08-010190 - A sticky bit must be set on all RHEL 8 public directories to prevent unauthorized and unintended information transferred via shared system resources.DISA Red Hat Enterprise Linux 8 STIG v2r1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

RHEL-08-010375 - RHEL 8 must restrict access to the kernel message buffer.DISA Red Hat Enterprise Linux 8 STIG v2r1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

RHEL-09-232245 - A sticky bit must be set on all RHEL 9 public directories.DISA Red Hat Enterprise Linux 9 STIG v2r3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

SLES-12-010375 - The SUSE operating system must restrict access to the kernel message buffer.DISA SLES 12 STIG v3r1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

SLES-15-010300 - The sticky bit must be set on all SUSE operating system world-writable directories.DISA SLES 15 STIG v2r2Unix

SYSTEM AND COMMUNICATIONS PROTECTION

SLES-15-010375 - The SUSE operating system must restrict access to the kernel message buffer.DISA SLES 15 STIG v2r2Unix

SYSTEM AND COMMUNICATIONS PROTECTION

UBTU-22-213010 - Ubuntu 22.04 LTS must restrict access to the kernel message buffer.DISA Canonical Ubuntu 22.04 LTS STIG v2r3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

UBTU-22-232145 - Ubuntu 22.04 LTS must set a sticky bit on all public directories to prevent unauthorized and unintended information transferred via shared system resources.DISA Canonical Ubuntu 22.04 LTS STIG v2r3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

UBTU-24-600150 - Ubuntu 24.04 LTS must set a sticky bit on all public directories to prevent unauthorized and unintended information transferred via shared system resources.DISA Canonical Ubuntu 24.04 LTS STIG v1r1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

VCPG-67-000018 - Data from the vPostgres database must be protected from unauthorized transfer.DISA STIG VMware vSphere 6.7 PostgreSQL v1r2Unix

SYSTEM AND COMMUNICATIONS PROTECTION

WN11-00-000060 - Non-system-created file shares on a system must limit access to groups that require it.DISA Windows 11 STIG v2r2Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN11-CC-000275 - Local drives must be prevented from sharing with Remote Desktop Session Hosts.DISA Windows 11 STIG v2r2Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN22-00-000230 - Windows Server 2022 nonsystem-created file shares must limit access to groups that require it.DISA Microsoft Windows Server 2022 STIG v2r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN22-CC-000350 - Windows Server 2022 Remote Desktop Services must prevent drive redirection.DISA Microsoft Windows Server 2022 STIG v2r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN22-DC-000120 - Windows Server 2022 data files owned by users must be on a different logical partition from the directory server data files.DISA Microsoft Windows Server 2022 STIG v2r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN22-SO-000250 - Windows Server 2022 must restrict anonymous access to Named Pipes and Shares.DISA Microsoft Windows Server 2022 STIG v2r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION