CASA-VN-000240 - The Cisco ASA must be configured to use FIPS-validated SHA-2 or higher for Internet Key Exchange (IKE) Phase 2 - IKE Phase 2 | DISA STIG Cisco ASA VPN v2r1 | Cisco | SYSTEM AND COMMUNICATIONS PROTECTION |
CASA-VN-000240 - The Cisco ASA must be configured to use FIPS-validated SHA-2 or higher for Internet Key Exchange (IKE) Phase 2 - proposal | DISA STIG Cisco ASA VPN v2r1 | Cisco | SYSTEM AND COMMUNICATIONS PROTECTION |
CNTR-K8-001400 - The Kubernetes API server must use approved cipher suites. | DISA STIG Kubernetes v1r5 | Unix | |
CNTR-K8-001400 - The Kubernetes API server must use approved cipher suites. | DISA STIG Kubernetes v1r6 | Unix | |
CNTR-K8-001400 - The Kubernetes API server must use approved cipher suites. | DISA STIG Kubernetes v1r8 | Unix | |
CNTR-K8-001400 - The Kubernetes API server must use approved cipher suites. | DISA STIG Kubernetes v1r11 | Unix | |
CNTR-K8-001410 - Kubernetes API Server must have the SSL Certificate Authority set. | DISA STIG Kubernetes v1r6 | Unix | |
CNTR-K8-001410 - Kubernetes API Server must have the SSL Certificate Authority set. | DISA STIG Kubernetes v1r11 | Unix | |
CNTR-K8-001420 - Kubernetes Kubelet must have the SSL Certificate Authority set. | DISA STIG Kubernetes v2r1 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
CNTR-K8-001430 - Kubernetes Controller Manager must have the SSL Certificate Authority set. | DISA STIG Kubernetes v1r6 | Unix | |
CNTR-K8-001430 - Kubernetes Controller Manager must have the SSL Certificate Authority set. | DISA STIG Kubernetes v1r8 | Unix | |
CNTR-K8-001430 - Kubernetes Controller Manager must have the SSL Certificate Authority set. | DISA STIG Kubernetes v1r11 | Unix | |
CNTR-K8-001440 - Kubernetes API Server must have a certificate for communication - tls-private-key-file | DISA STIG Kubernetes v1r6 | Unix | |
CNTR-K8-001470 - Kubernetes Kubelet must enable tls-cert-file for client authentication to secure service. | DISA STIG Kubernetes v1r6 | Unix | |
CNTR-K8-001470 - Kubernetes Kubelet must enable tls-cert-file for client authentication to secure service. | DISA STIG Kubernetes v1r8 | Unix | |
CNTR-K8-001470 - Kubernetes Kubelet must enable tlsCertFile for client authentication to secure service. | DISA STIG Kubernetes v2r1 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
CNTR-K8-001490 - Kubernetes etcd must have a key file for secure communication. | DISA STIG Kubernetes v1r4 | Unix | |
CNTR-K8-001490 - Kubernetes etcd must have a key file for secure communication. | DISA STIG Kubernetes v1r5 | Unix | |
CNTR-K8-001490 - Kubernetes etcd must have a key file for secure communication. | DISA STIG Kubernetes v1r11 | Unix | |
CNTR-K8-001500 - Kubernetes etcd must have a certificate for communication. | DISA STIG Kubernetes v1r5 | Unix | |
CNTR-K8-001510 - Kubernetes etcd must have the SSL Certificate Authority set. | DISA STIG Kubernetes v1r4 | Unix | |
CNTR-K8-001510 - Kubernetes etcd must have the SSL Certificate Authority set. | DISA STIG Kubernetes v2r1 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
CNTR-K8-001520 - Kubernetes etcd must have a certificate for communication. | DISA STIG Kubernetes v1r5 | Unix | |
CNTR-K8-001520 - Kubernetes etcd must have a certificate for communication. | DISA STIG Kubernetes v1r11 | Unix | |
CNTR-K8-001530 - Kubernetes etcd must have a key file for secure communication. | DISA STIG Kubernetes v1r8 | Unix | |
CNTR-K8-001530 - Kubernetes etcd must have a key file for secure communication. | DISA STIG Kubernetes v1r11 | Unix | |
CNTR-K8-001540 - Kubernetes etcd must have peer-cert-file set for secure communication. | DISA STIG Kubernetes v1r4 | Unix | |
CNTR-K8-001540 - Kubernetes etcd must have peer-cert-file set for secure communication. | DISA STIG Kubernetes v2r1 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
CNTR-K8-001550 - Kubernetes etcd must have a peer-key-file set for secure communication. | DISA STIG Kubernetes v1r5 | Unix | |
CNTR-K8-001550 - Kubernetes etcd must have a peer-key-file set for secure communication. | DISA STIG Kubernetes v1r8 | Unix | |
DTBI046-IE11 - Logon options must be configured to prompt (Internet zone). | DISA STIG IE 11 v1r19 | Windows | ACCESS CONTROL |
DTBI046-IE11 - Logon options must be configured to prompt (Internet zone). | DISA STIG IE 11 v1r18 | Windows | ACCESS CONTROL |
DTBI136-IE11 - Logon options must be configured and enforced (Restricted Sites zone). | DISA STIG IE 11 v1r18 | Windows | ACCESS CONTROL |
DTBI136-IE11 - Logon options must be configured and enforced (Restricted Sites zone). | DISA STIG IE 11 v1r19 | Windows | ACCESS CONTROL |
DTOO421 - Session Initiation Protocol (SIP) security mode must be configured. | DISA STIG Microsoft Lync 2013 v1r4 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
DTOO421 - Session Initiation Protocol (SIP) security mode must be configured. | DISA STIG Microsoft Skype for Business 2016 v1r1 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
DTOO422 - In the event a secure SIP connection fails, the connection must be restricted from resorting to the unencrypted HTTP. | DISA STIG Microsoft Lync 2013 v1r4 | Windows | CONFIGURATION MANAGEMENT |
DTOO422 - In the event a secure SIP connection fails, the connection must be restricted from resorting to the unencrypted HTTP. | DISA STIG Microsoft Skype for Business 2016 v1r1 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
EX13-EG-000090 - Exchange Internet-facing Receive connectors must offer Transport Layer Security (TLS) before using basic authentication. | DISA Microsoft Exchange 2013 Edge Transport Server STIG v1r5 | Windows | |
EX13-EG-000090 - Exchange Internet-facing Receive connectors must offer Transport Layer Security (TLS) before using basic authentication. | DISA Microsoft Exchange 2013 Edge Transport Server STIG v1r4 | Windows | IDENTIFICATION AND AUTHENTICATION |
EX13-MB-000115 - Exchange internal Send connectors must use Domain Security (mutual authentication Transport Layer Security). | DISA Microsoft Exchange 2013 Mailbox Server STIG v1r6 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
EX19-ED-000099 Exchange internet-facing receive connectors must offer Transport Layer Security (TLS) before using basic authentication. | DISA Microsoft Exchange 2019 Edge Server STIG v2r1 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
F5BI-AP-000234 - The F5 BIG-IP appliance must not use the On-Demand Cert Auth VPE agent as part of the APM Policy Profiles. | DISA F5 BIG-IP Access Policy Manager STIG v2r3 | F5 | SYSTEM AND COMMUNICATIONS PROTECTION |
F5BI-AP-000236 - The F5 BIG-IP appliance must be configured to limit authenticated client sessions to initial session source IP. | DISA F5 BIG-IP Access Policy Manager STIG v2r3 | F5 | SYSTEM AND COMMUNICATIONS PROTECTION |
F5BI-LT-000097 - The BIG-IP Core implementation must be configured to protect the authenticity of communications sessions. | DISA F5 BIG-IP Local Traffic Manager 11.x STIG v1r3 | F5 | SYSTEM AND COMMUNICATIONS PROTECTION |
SP13-00-000110 - SharePoint must ensure authentication of both client and server during the entire session. An example of this is SSL Mutual Authentication. | DISA STIG SharePoint 2013 v1r8 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
WBSP-AS-001410 - The WebSphere Application Server DoD root CAs must be in the trust store. | DISA IBM WebSphere Traditional 9 STIG v1r1 Middleware | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
WBSP-AS-001410 - The WebSphere Application Server DoD root CAs must be in the trust store. | DISA IBM WebSphere Traditional 9 Windows STIG v1r1 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
WBSP-AS-001410 - The WebSphere Application Server DoD root CAs must be in the trust store. | DISA IBM WebSphere Traditional 9 STIG v1r1 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
WDNS-SC-000020 - The Windows 2012 DNS Server must protect the authenticity of dynamic updates via transaction signing. | DISA Microsoft Windows 2012 Server DNS STIG v1r14 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |