Item Search

NameAudit NamePluginCategory
AIX7-00-002028 - AIX must verify the hash of audit tools - Trusted ExecutionDISA STIG AIX 7.x v2r5Unix
AIX7-00-002028 - AIX must verify the hash of audit tools - tsd.dat cert_tagDISA STIG AIX 7.x v2r6Unix
AIX7-00-002028 - AIX must verify the hash of audit tools - tsd.dat signatureDISA STIG AIX 7.x v2r6Unix
OL08-00-030650 - OL 8 must use cryptographic mechanisms to protect the integrity of audit tools - auditdDISA Oracle Linux 8 STIG v1r4Unix
OL08-00-030650 - OL 8 must use cryptographic mechanisms to protect the integrity of audit tools - autraceDISA Oracle Linux 8 STIG v1r4Unix
OL08-00-030650 - OL 8 must use cryptographic mechanisms to protect the integrity of audit tools - rsyslogdDISA Oracle Linux 8 STIG v1r2Unix
OL08-00-030650 - OL 8 must use cryptographic mechanisms to protect the integrity of audit tools - rsyslogdDISA Oracle Linux 8 STIG v1r6Unix
OL08-00-030650 - OL 8 must use cryptographic mechanisms to protect the integrity of audit tools.DISA Oracle Linux 8 STIG v1r9Unix
OL08-00-030650 - OL 8 must use cryptographic mechanisms to protect the integrity of audit tools.DISA Oracle Linux 8 STIG v1r10Unix

AUDIT AND ACCOUNTABILITY

OL08-00-030650 - OL 8 must use cryptographic mechanisms to protect the integrity of audit tools. - autraceDISA Oracle Linux 8 STIG v1r1Unix
PHTN-30-000051 - The Photon operating system package files must not be modified.DISA STIG VMware vSphere 7.0 Photon OS v1r3Unix

AUDIT AND ACCOUNTABILITY

PHTN-67-000053 - The Photon operating system package files must not be modified.DISA STIG VMware vSphere 6.7 Photon OS v1r3Unix
PHTN-67-000053 - The Photon operating system package files must not be modified.DISA STIG VMware vSphere 6.7 Photon OS v1r6Unix

AUDIT AND ACCOUNTABILITY

RHEL-08-030650 - RHEL 8 must use cryptographic mechanisms to protect the integrity of audit tools - auditctlDISA Red Hat Enterprise Linux 8 STIG v1r6Unix
RHEL-08-030650 - RHEL 8 must use cryptographic mechanisms to protect the integrity of audit tools - auditdDISA Red Hat Enterprise Linux 8 STIG v1r7Unix
RHEL-08-030650 - RHEL 8 must use cryptographic mechanisms to protect the integrity of audit tools - auditdDISA Red Hat Enterprise Linux 8 STIG v1r8Unix
RHEL-08-030650 - RHEL 8 must use cryptographic mechanisms to protect the integrity of audit tools - auditdDISA Red Hat Enterprise Linux 8 STIG v1r9Unix
RHEL-08-030650 - RHEL 8 must use cryptographic mechanisms to protect the integrity of audit tools - auditdDISA Red Hat Enterprise Linux 8 STIG v1r5Unix
RHEL-08-030650 - RHEL 8 must use cryptographic mechanisms to protect the integrity of audit tools - augenrulesDISA Red Hat Enterprise Linux 8 STIG v1r3Unix
RHEL-08-030650 - RHEL 8 must use cryptographic mechanisms to protect the integrity of audit tools - aureportDISA Red Hat Enterprise Linux 8 STIG v1r5Unix
RHEL-08-030650 - RHEL 8 must use cryptographic mechanisms to protect the integrity of audit tools - aureportDISA Red Hat Enterprise Linux 8 STIG v1r7Unix
RHEL-08-030650 - RHEL 8 must use cryptographic mechanisms to protect the integrity of audit tools - ausearchDISA Red Hat Enterprise Linux 8 STIG v1r5Unix
RHEL-08-030650 - RHEL 8 must use cryptographic mechanisms to protect the integrity of audit tools - ausearchDISA Red Hat Enterprise Linux 8 STIG v1r7Unix
RHEL-08-030650 - RHEL 8 must use cryptographic mechanisms to protect the integrity of audit tools - autraceDISA Red Hat Enterprise Linux 8 STIG v1r3Unix
RHEL-08-030650 - RHEL 8 must use cryptographic mechanisms to protect the integrity of audit tools - autraceDISA Red Hat Enterprise Linux 8 STIG v1r6Unix
RHEL-08-030650 - RHEL 8 must use cryptographic mechanisms to protect the integrity of audit tools - rsyslogdDISA Red Hat Enterprise Linux 8 STIG v1r7Unix
RHEL-08-030650 - RHEL 8 must use cryptographic mechanisms to protect the integrity of audit tools.DISA Red Hat Enterprise Linux 8 STIG v1r14Unix

AUDIT AND ACCOUNTABILITY

RHEL-08-030650 - RHEL 8 must use cryptographic mechanisms to protect the integrity of audit tools. - augenrulesDISA Red Hat Enterprise Linux 8 STIG v1r1Unix
RHEL-08-030650 - RHEL 8 must use cryptographic mechanisms to protect the integrity of audit tools. - aureportDISA Red Hat Enterprise Linux 8 STIG v1r1Unix
RHEL-08-030650 - RHEL 8 must use cryptographic mechanisms to protect the integrity of audit tools. - autraceDISA Red Hat Enterprise Linux 8 STIG v1r1Unix
RHEL-08-030650 - RHEL 8 must use cryptographic mechanisms to protect the integrity of audit tools. - rsyslogdDISA Red Hat Enterprise Linux 8 STIG v1r1Unix
SLES-15-030630 - The SUSE operating system file integrity tool must be configured to protect the integrity of the audit tools - auditctlDISA SLES 15 STIG v1r9Unix
SLES-15-030630 - The SUSE operating system file integrity tool must be configured to protect the integrity of the audit tools - auditdDISA SLES 15 STIG v1r9Unix
SLES-15-030630 - The SUSE operating system file integrity tool must be configured to protect the integrity of the audit tools - aureportDISA SLES 15 STIG v1r9Unix
SLES-15-030630 - The SUSE operating system file integrity tool must be configured to protect the integrity of the audit tools - autraceDISA SLES 15 STIG v1r6Unix
SLES-15-030630 - The SUSE operating system file integrity tool must be configured to protect the integrity of the audit tools.DISA SLES 15 STIG v1r10Unix
SLES-15-030630 - The SUSE operating system file integrity tool must be configured to protect the integrity of the audit tools.DISA SLES 15 STIG v1r11Unix
SLES-15-030630 - The SUSE operating system file integrity tool must be configured to protect the integrity of the audit tools.DISA SLES 15 STIG v1r13Unix

AUDIT AND ACCOUNTABILITY

SOL-11.1-020080 - System packages must be configured with the vendor-provided files, permissions, and ownerships.DISA STIG Solaris 11 SPARC v2r8Unix
UBTU-18-010506 - The Ubuntu operating system must use cryptographic mechanisms to protect the integrity of audit tools - auditdDISA STIG Ubuntu 18.04 LTS v2r10Unix
UBTU-18-010506 - The Ubuntu operating system must use cryptographic mechanisms to protect the integrity of audit tools - aureportDISA STIG Ubuntu 18.04 LTS v2r8Unix
UBTU-18-010506 - The Ubuntu operating system must use cryptographic mechanisms to protect the integrity of audit tools - autraceDISA STIG Ubuntu 18.04 LTS v2r7Unix
UBTU-18-010506 - The Ubuntu operating system must use cryptographic mechanisms to protect the integrity of audit tools.DISA STIG Ubuntu 18.04 LTS v2r13Unix
UBTU-20-010205 - The Ubuntu operating system must use cryptographic mechanisms to protect the integrity of audit tools - auditdDISA STIG Ubuntu 20.04 LTS v1r4Unix
UBTU-20-010205 - The Ubuntu operating system must use cryptographic mechanisms to protect the integrity of audit tools - aureportDISA STIG Ubuntu 20.04 LTS v1r1Unix
UBTU-20-010205 - The Ubuntu operating system must use cryptographic mechanisms to protect the integrity of audit tools - aureportDISA STIG Ubuntu 20.04 LTS v1r5Unix
UBTU-20-010205 - The Ubuntu operating system must use cryptographic mechanisms to protect the integrity of audit tools - ausearchDISA STIG Ubuntu 20.04 LTS v1r5Unix
UBTU-20-010205 - The Ubuntu operating system must use cryptographic mechanisms to protect the integrity of audit tools - ausearchDISA STIG Ubuntu 20.04 LTS v1r1Unix
UBTU-20-010205 - The Ubuntu operating system must use cryptographic mechanisms to protect the integrity of audit tools.DISA STIG Ubuntu 20.04 LTS v1r12Unix

AUDIT AND ACCOUNTABILITY

UBTU-22-651030 - Ubuntu 22.04 LTS must use cryptographic mechanisms to protect the integrity of audit tools.DISA STIG Canonical Ubuntu 22.04 LTS v1r1Unix

AUDIT AND ACCOUNTABILITY