Item Search

NameAudit NamePluginCategory
GEN000000-LNX00320 - The system must not have special privilege accounts, such as shutdown and halt - /etc/shadow shutdown'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

GEN000000-LNX00440 - The /etc/security/access.conf file must have mode 0640 or less permissive.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN000000-LNX00560 - The Linux NFS Server must not have the insecure file locking option.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

GEN000000-LNX00640 - The /etc/securetty file must be owned by root.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN000000-LNX00660 - The /etc/securetty file must have mode 0600 or less permissive.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN000250 - The time synchronization configuration file (such as /etc/ntp.conf) must be owned by root.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN000253 - The time synchronization configuration file (such as /etc/ntp.conf) must not have an extended ACL.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN001190 - All network services daemon files must not have extended ACLs.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN001364 - The /etc/resolv.conf file must have mode 0644 or less permissive.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN001365 - The /etc/resolv.conf file must not have an extended ACL.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN001366 - The /etc/hosts file must be owned by root.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN001372 - The /etc/nsswitch.conf file must be group-owned by root, bin, or sys.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN001380 - The /etc/passwd file must have mode 0644 or less permissive.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN001410 - The /etc/shadow file (or equivalent) must be group-owned by root, bin, or sys - or equivalent file must be group-owned by root, bin, or sys.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN001580 - All run control scripts must have mode 0755 or less permissive - '/etc/rc.d/rc3.d/*'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN001580 - All run control scripts must have mode 0755 or less permissive - '/etc/rc.d/rc4.d/*'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN001590 - All run control scripts must have no extended ACLs - '/etc/init.d'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN003050 - Crontab files must be group-owned by root, cron, or the crontab creators primary group - '/etc/cron.d/*'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN003050 - Crontab files must be group-owned by root, cron, or the crontab creators primary group - '/etc/cron.daily/*'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN003060 - Default system accounts (with the exception of root) must not be listed in the cron.allow file or must be included in the cron.deny file, if cron.allow does not exist - 'adm'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN003060 - Default system accounts (with the exception of root) must not be listed in the cron.allow file or must be included in the cron.deny file, if cron.allow does not exist - 'operator'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN003080 - Crontab files must have mode 0600 or less permissive, and files in cron script directories must have mode 0700 or less permissive - '/etc/crontab'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN003100 - Cron and crontab directories must have mode 0755 or less permissive - '/var/spool/cron'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN003110 - Cron and crontab directories must not have extended ACLs - '/etc/cron.hourly'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN003110 - Cron and crontab directories must not have extended ACLs - '/etc/cron.weekly'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN003120 - Cron and crontab directories must be owned by root or bin - '/var/spool/cron'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN003140 - Cron and crontab directories must be group-owned by root, sys, bin or cron - '/etc/cron.d'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN003220 - Cron programs must not set the umask to a value less restrictive than 077 - '/etc/cron.d/*'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN003220 - Cron programs must not set the umask to a value less restrictive than 077 - '/etc/cron.monthly/*'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN003252 - The at.deny file must have mode 0600 or less permissive.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN003255 - The at.deny file must not have an extended ACL.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN003320 - Default system accounts (with the exception of root) must not be listed in the at.allow file or must be included in the at.deny file if the at.allow file does not exist - 'adm'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN003320 - Default system accounts (with the exception of root) must not be listed in the at.allow file or must be included in the at.deny file if the at.allow file does not exist - 'daemon'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN003320 - Default system accounts (with the exception of root) must not be listed in the at.allow file or must be included in the at.deny file if the at.allow file does not exist - 'games'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN003320 - Default system accounts (with the exception of root) must not be listed in the at.allow file or must be included in the at.deny file if the at.allow file does not exist - 'nobody'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN003400 - The at directory must have mode 0755 or less permissive - at directory must have mode 0755 or less permissive.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN003420 - The at directory must be owned by root, bin, sys, daemon, or cron - at directory must be owned by root, bin, or sys.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN003430 - The at directory must be group-owned by root, bin, sys, or cron - at directory must be group-owned by root, bin, sys, or cron.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN003470 - The at.allow file must be group-owned by root, bin, sys, or cron.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN003480 - The at.deny file must be owned by root, bin, or sys.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN003522 - The kernel core dump data directory must have mode 0700 or less permissive.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN003720 - The inetd.conf file, xinetd.conf file, and the xinetd.d directory must be owned by root or bin - '/etc/xinetd.d/*'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN004010 - The traceroute file must not have an extended ACL.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN004360 - The alias file must be owned by root - '/etc/aliases.db'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN004370 - The aliases file must be group-owned by root, sys, bin, or system - '/etc/postfix/aliases.db'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN004380 - The alias file must have mode 0644 or less permissive - '/etc/aliases.db'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN004380 - The alias file must have mode 0644 or less permissive - '/etc/aliases'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN004390 - The alias file must not have an extended ACL - '/etc/aliases.db'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN004390 - The alias file must not have an extended ACL - '/etc/postfix/aliases.db'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN008740 - The systems boot loader configuration file(s) must not have extended ACLs - s must not have extended ACLs.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT