Item Search

NameAudit NamePluginCategory
CASA-VN-000240 - The Cisco ASA must be configured to use FIPS-validated SHA-2 or higher for Internet Key Exchange (IKE) Phase 2 - IKE Phase 2DISA STIG Cisco ASA VPN v2r1Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CASA-VN-000240 - The Cisco ASA must be configured to use FIPS-validated SHA-2 or higher for Internet Key Exchange (IKE) Phase 2 - proposalDISA STIG Cisco ASA VPN v2r1Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CNTR-K8-001400 - The Kubernetes API server must use approved cipher suites.DISA STIG Kubernetes v1r5Unix
CNTR-K8-001400 - The Kubernetes API server must use approved cipher suites.DISA STIG Kubernetes v1r6Unix
CNTR-K8-001400 - The Kubernetes API server must use approved cipher suites.DISA STIG Kubernetes v1r8Unix
CNTR-K8-001400 - The Kubernetes API server must use approved cipher suites.DISA STIG Kubernetes v1r11Unix
CNTR-K8-001410 - Kubernetes API Server must have the SSL Certificate Authority set.DISA STIG Kubernetes v1r6Unix
CNTR-K8-001410 - Kubernetes API Server must have the SSL Certificate Authority set.DISA STIG Kubernetes v1r11Unix
CNTR-K8-001420 - Kubernetes Kubelet must have the SSL Certificate Authority set.DISA STIG Kubernetes v2r1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

CNTR-K8-001430 - Kubernetes Controller Manager must have the SSL Certificate Authority set.DISA STIG Kubernetes v1r6Unix
CNTR-K8-001430 - Kubernetes Controller Manager must have the SSL Certificate Authority set.DISA STIG Kubernetes v1r8Unix
CNTR-K8-001430 - Kubernetes Controller Manager must have the SSL Certificate Authority set.DISA STIG Kubernetes v1r11Unix
CNTR-K8-001440 - Kubernetes API Server must have a certificate for communication - tls-private-key-fileDISA STIG Kubernetes v1r6Unix
CNTR-K8-001470 - Kubernetes Kubelet must enable tls-cert-file for client authentication to secure service.DISA STIG Kubernetes v1r6Unix
CNTR-K8-001470 - Kubernetes Kubelet must enable tls-cert-file for client authentication to secure service.DISA STIG Kubernetes v1r8Unix
CNTR-K8-001470 - Kubernetes Kubelet must enable tlsCertFile for client authentication to secure service.DISA STIG Kubernetes v2r1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

CNTR-K8-001490 - Kubernetes etcd must have a key file for secure communication.DISA STIG Kubernetes v1r4Unix
CNTR-K8-001490 - Kubernetes etcd must have a key file for secure communication.DISA STIG Kubernetes v1r5Unix
CNTR-K8-001490 - Kubernetes etcd must have a key file for secure communication.DISA STIG Kubernetes v1r11Unix
CNTR-K8-001500 - Kubernetes etcd must have a certificate for communication.DISA STIG Kubernetes v1r5Unix
CNTR-K8-001510 - Kubernetes etcd must have the SSL Certificate Authority set.DISA STIG Kubernetes v1r4Unix
CNTR-K8-001510 - Kubernetes etcd must have the SSL Certificate Authority set.DISA STIG Kubernetes v2r1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

CNTR-K8-001520 - Kubernetes etcd must have a certificate for communication.DISA STIG Kubernetes v1r5Unix
CNTR-K8-001520 - Kubernetes etcd must have a certificate for communication.DISA STIG Kubernetes v1r11Unix
CNTR-K8-001530 - Kubernetes etcd must have a key file for secure communication.DISA STIG Kubernetes v1r8Unix
CNTR-K8-001530 - Kubernetes etcd must have a key file for secure communication.DISA STIG Kubernetes v1r11Unix
CNTR-K8-001540 - Kubernetes etcd must have peer-cert-file set for secure communication.DISA STIG Kubernetes v1r4Unix
CNTR-K8-001540 - Kubernetes etcd must have peer-cert-file set for secure communication.DISA STIG Kubernetes v2r1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

CNTR-K8-001550 - Kubernetes etcd must have a peer-key-file set for secure communication.DISA STIG Kubernetes v1r5Unix
CNTR-K8-001550 - Kubernetes etcd must have a peer-key-file set for secure communication.DISA STIG Kubernetes v1r8Unix
DTBI046-IE11 - Logon options must be configured to prompt (Internet zone).DISA STIG IE 11 v1r19Windows

ACCESS CONTROL

DTBI046-IE11 - Logon options must be configured to prompt (Internet zone).DISA STIG IE 11 v1r18Windows

ACCESS CONTROL

DTBI136-IE11 - Logon options must be configured and enforced (Restricted Sites zone).DISA STIG IE 11 v1r18Windows

ACCESS CONTROL

DTBI136-IE11 - Logon options must be configured and enforced (Restricted Sites zone).DISA STIG IE 11 v1r19Windows

ACCESS CONTROL

DTOO421 - Session Initiation Protocol (SIP) security mode must be configured.DISA STIG Microsoft Lync 2013 v1r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO421 - Session Initiation Protocol (SIP) security mode must be configured.DISA STIG Microsoft Skype for Business 2016 v1r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO422 - In the event a secure SIP connection fails, the connection must be restricted from resorting to the unencrypted HTTP.DISA STIG Microsoft Lync 2013 v1r4Windows

CONFIGURATION MANAGEMENT

DTOO422 - In the event a secure SIP connection fails, the connection must be restricted from resorting to the unencrypted HTTP.DISA STIG Microsoft Skype for Business 2016 v1r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

EX13-EG-000090 - Exchange Internet-facing Receive connectors must offer Transport Layer Security (TLS) before using basic authentication.DISA Microsoft Exchange 2013 Edge Transport Server STIG v1r5Windows
EX13-EG-000090 - Exchange Internet-facing Receive connectors must offer Transport Layer Security (TLS) before using basic authentication.DISA Microsoft Exchange 2013 Edge Transport Server STIG v1r4Windows

IDENTIFICATION AND AUTHENTICATION

EX13-MB-000115 - Exchange internal Send connectors must use Domain Security (mutual authentication Transport Layer Security).DISA Microsoft Exchange 2013 Mailbox Server STIG v1r6Windows

SYSTEM AND COMMUNICATIONS PROTECTION

EX19-ED-000099 Exchange internet-facing receive connectors must offer Transport Layer Security (TLS) before using basic authentication.DISA Microsoft Exchange 2019 Edge Server STIG v2r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

F5BI-AP-000234 - The F5 BIG-IP appliance must not use the On-Demand Cert Auth VPE agent as part of the APM Policy Profiles.DISA F5 BIG-IP Access Policy Manager STIG v2r3F5

SYSTEM AND COMMUNICATIONS PROTECTION

F5BI-AP-000236 - The F5 BIG-IP appliance must be configured to limit authenticated client sessions to initial session source IP.DISA F5 BIG-IP Access Policy Manager STIG v2r3F5

SYSTEM AND COMMUNICATIONS PROTECTION

F5BI-LT-000097 - The BIG-IP Core implementation must be configured to protect the authenticity of communications sessions.DISA F5 BIG-IP Local Traffic Manager 11.x STIG v1r3F5

SYSTEM AND COMMUNICATIONS PROTECTION

SP13-00-000110 - SharePoint must ensure authentication of both client and server during the entire session. An example of this is SSL Mutual Authentication.DISA STIG SharePoint 2013 v1r8Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WBSP-AS-001410 - The WebSphere Application Server DoD root CAs must be in the trust store.DISA IBM WebSphere Traditional 9 STIG v1r1 MiddlewareUnix

SYSTEM AND COMMUNICATIONS PROTECTION

WBSP-AS-001410 - The WebSphere Application Server DoD root CAs must be in the trust store.DISA IBM WebSphere Traditional 9 Windows STIG v1r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WBSP-AS-001410 - The WebSphere Application Server DoD root CAs must be in the trust store.DISA IBM WebSphere Traditional 9 STIG v1r1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

WDNS-SC-000020 - The Windows 2012 DNS Server must protect the authenticity of dynamic updates via transaction signing.DISA Microsoft Windows 2012 Server DNS STIG v1r14Windows

SYSTEM AND COMMUNICATIONS PROTECTION