Item Search

NameAudit NamePluginCategory
APPL-11-003001 - The macOS system must issue or obtain public key certificates under an appropriate certificate policy from an approved service provider.DISA STIG Apple macOS 11 v1r5Unix

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

APPL-11-003001 - The macOS system must issue or obtain public key certificates under an appropriate certificate policy from an approved service provider.DISA STIG Apple macOS 11 v1r8Unix

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

APPL-12-003001 - The macOS system must issue or obtain public key certificates under an appropriate certificate policy from an approved service provider.DISA STIG Apple macOS 12 v1r9Unix

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

APPL-13-003001 - The macOS system must issue or obtain public key certificates under an appropriate certificate policy from an approved service provider.DISA STIG Apple macOS 13 v1r4Unix

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

CISC-ND-001370 - The Cisco router must be configured to use an authentication server for the purpose of authenticating users prior to granting administrative access - ip http secure-serverDISA STIG Cisco IOS Router NDM v2r3Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-ND-001370 - The Cisco router must be configured to use an authentication server for the purpose of authenticating users prior to granting administrative access - ip http secure-serverDISA STIG Cisco IOS Router NDM v2r1Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-ND-001370 - The Cisco router must be configured to use an authentication server for the purpose of authenticating users prior to granting administrative access - ip http secure-serverDISA STIG Cisco IOS XE Router NDM v2r3Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-ND-001370 - The Cisco router must be configured to use an authentication server for the purpose of authenticating users prior to granting administrative access - ip http secure-serverDISA STIG Cisco IOS XE Router NDM v2r2Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-ND-001370 - The Cisco router must be configured to use an authentication server for the purpose of authenticating users prior to granting administrative access - ip http secure-serverDISA STIG Cisco IOS Router NDM v2r2Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-ND-001370 - The Cisco router must be configured to use an authentication server for the purpose of authenticating users prior to granting administrative access - ip http secure-serverDISA STIG Cisco IOS XE Router NDM v2r1Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-ND-001370 - The Cisco router must be configured to use an authentication server for the purpose of authenticating users prior to granting administrative access - line consoleDISA STIG Cisco IOS-XR Router NDM v2r1Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-ND-001370 - The Cisco router must be configured to use an authentication server for the purpose of authenticating users prior to granting administrative access - line consoleDISA STIG Cisco IOS-XR Router NDM v2r2Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

DKER-EE-006240 - Docker Enterprise data exchanged between Linux containers on different nodes must be encrypted on the overlay network.DISA STIG Docker Enterprise 2.x Linux/Unix v2r2Unix

SYSTEM AND COMMUNICATIONS PROTECTION

GEN005538 - The SSH daemon must not allow rhosts RSA authentication.DISA STIG Solaris 10 SPARC v2r2Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

GEN005538 - The SSH daemon must not allow rhosts RSA authentication.DISA STIG Solaris 10 X86 v2r1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

GEN005538 - The SSH daemon must not allow rhosts RSA authentication.DISA STIG Solaris 10 SPARC v2r1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

GEN005538 - The SSH daemon must not allow rhosts RSA authentication.DISA STIG Solaris 10 X86 v2r2Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

GEN006575 - The file integrity tool must use FIPS 140-2 approved cryptographic hashes for validating file contents - configDISA STIG Solaris 10 X86 v2r1Unix

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

GEN006575 - The file integrity tool must use FIPS 140-2 approved cryptographic hashes for validating file contents - configDISA STIG Solaris 10 X86 v2r2Unix

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

GEN006575 - The file integrity tool must use FIPS 140-2 approved cryptographic hashes for validating file contents - configDISA STIG Solaris 10 SPARC v2r1Unix

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

GEN006575 - The file integrity tool must use FIPS 140-2 approved cryptographic hashes for validating file contents - configDISA STIG Solaris 10 SPARC v2r2Unix

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

IISW-SI-000249 - The IIS 8.5 website must maintain the confidentiality and integrity of information during preparation for transmission and during reception.DISA IIS 8.5 Site v2r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

PGS9-00-003000 - PostgreSQL must maintain the confidentiality and integrity of information during reception.DISA STIG PostgreSQL 9.x on RHEL OS v2r2Unix

SYSTEM AND COMMUNICATIONS PROTECTION

PGS9-00-007200 - PostgreSQL must maintain the confidentiality and integrity of information during preparation for transmission.DISA STIG PostgreSQL 9.x on RHEL DB v2r1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

PGS9-00-012800 - The DBMS must be configured on a platform that has a NIST certified FIPS 140-2 installation of OpenSSL - fips_enabledDISA STIG PostgreSQL 9.x on RHEL OS v2r2Unix

SYSTEM AND COMMUNICATIONS PROTECTION

RHEL-09-672010 - RHEL 9 must have the crypto-policies package installed.DISA Red Hat Enterprise Linux 9 STIG v2r1Unix

MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION

RHEL-09-672020 - RHEL 9 crypto policy must not be overridden.DISA Red Hat Enterprise Linux 9 STIG v2r1Unix

MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION

SLES-12-010230 - The SUSE operating system must configure the Linux Pluggable Authentication Modules (PAM) to only store encrypted representations of passwords - sha512DISA SLES 12 STIG v2r1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

SLES-12-010230 - The SUSE operating system must configure the Linux Pluggable Authentication Modules (PAM) to only store encrypted representations of passwords - sha512DISA SLES 12 STIG v2r2Unix

SYSTEM AND COMMUNICATIONS PROTECTION

SLES-12-010240 - The SUSE operating system must employ FIPS 140-2-approved cryptographic hashing algorithms for all stored passwords - SHA_CRYPT_MIN_ROUNDSDISA SLES 12 STIG v2r2Unix

SYSTEM AND COMMUNICATIONS PROTECTION

SLES-12-010240 - The SUSE operating system must employ FIPS 140-2-approved cryptographic hashing algorithms for all stored passwords - SHA_CRYPT_MIN_ROUNDSDISA SLES 12 STIG v2r1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

SLES-15-020190 - The SUSE operating system must employ FIPS 140-2-approved cryptographic hashing algorithms for all stored passwords - SHA_CRYPT_MIN_ROUNDSDISA SLES 15 STIG v1r1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

SLES-15-020190 - The SUSE operating system must employ FIPS 140-2-approved cryptographic hashing algorithms for all stored passwords - SHA_CRYPT_MIN_ROUNDSDISA SLES 15 STIG v1r3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

SQL6-D0-015800 - SQL Server must implement NIST FIPS 140-2 or 140-3 validated cryptographic modules to protect unclassified information requiring confidentiality and cryptographic protection, in accordance with the data owners requirements.DISA STIG SQL Server 2016 Instance OS Audit v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

UBTU-16-010150 - The Ubuntu operating system must encrypt all stored passwords with a FIPS 140-2 approved cryptographic hashing algorithm.DISA STIG Ubuntu 16.04 LTS v2r1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

WBLC-05-000176 - Oracle WebLogic must use cryptographic modules that meet the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance when encrypting stored data - JAVA_OPTIONSOracle WebLogic Server 12c v1r6Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WBLC-05-000177 - Oracle WebLogic must utilize FIPS 140-2 approved encryption modules when authenticating users and processes - JAVA_OPTIONSOracle WebLogic Server 12c v1r6 MiddlewareUnix

SYSTEM AND COMMUNICATIONS PROTECTION

WBLC-05-000177 - Oracle WebLogic must utilize FIPS 140-2 approved encryption modules when authenticating users and processes - JAVA_OPTIONSOracle WebLogic Server 12c v1r6Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WBLC-08-000214 - Oracle WebLogic must utilize NSA-approved cryptography when protecting classified compartmentalized data - PRE_CLASSPATHOracle WebLogic Server 12c v1r6 MiddlewareUnix

SYSTEM AND COMMUNICATIONS PROTECTION

WN12-AD-000011-DC - Separate, NSA-approved (Type 1) cryptography must be used to protect the directory data-in-transit for directory service implementations at a classified confidentiality level when replication data traverses a network cleared to a lower level than the data - Type 1 cryptography must be used to protect the directory data-in-transit for directory service implementations at a classified confidentiality level when replication data traverses a network cleared to a lower level than the data.DISA Windows Server 2012 and 2012 R2 DC STIG v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN12-AD-000011-DC - Separate, NSA-approved (Type 1) cryptography must be used to protect the directory data-in-transit for directory service implementations at a classified confidentiality level when replication data traverses a network cleared to a lower level than the data - Type 1 cryptography must be used to protect the directory data-in-transit for directory service implementations at a classified confidentiality level when replication data traverses a network cleared to a lower level than the data.DISA Windows Server 2012 and 2012 R2 DC STIG v3r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN12-AD-000011-DC - Separate, NSA-approved (Type 1) cryptography must be used to protect the directory data-in-transit for directory service implementations at a classified confidentiality level when replication data traverses a network cleared to a lower level than the data - Type 1 cryptography must be used to protect the directory data-in-transit for directory service implementations at a classified confidentiality level when replication data traverses a network cleared to a lower level than the data.DISA Windows Server 2012 and 2012 R2 DC STIG v3r2Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN12-AD-000011-DC - Separate, NSA-approved (Type 1) cryptography must be used to protect the directory data-in-transit for directory service implementations at a classified confidentiality level when replication data traverses a network cleared to a lower level than the data - Type 1 cryptography must be used to protect the directory data-in-transit for directory service implementations at a classified confidentiality level when replication data traverses a network cleared to a lower level than the data.DISA Windows Server 2012 and 2012 R2 DC STIG v3r7Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN16-SO-000350 - Kerberos encryption types must be configured to prevent the use of DES and RC4 encryption suites.DISA Windows Server 2016 STIG v2r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN16-SO-000350 - Kerberos encryption types must be configured to prevent the use of DES and RC4 encryption suites.DISA Windows Server 2016 STIG v2r2Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN16-SO-000430 - Windows Server 2016 must be configured to use FIPS-compliant algorithms for encryption, hashing, and signing.DISA Windows Server 2016 STIG v2r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN16-SO-000430 - Windows Server 2016 must be configured to use FIPS-compliant algorithms for encryption, hashing, and signing.DISA Windows Server 2016 STIG v2r2Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN19-DC-000140 - Windows Server 2019 must use separate, NSA-approved (Type 1) cryptography to protect the directory data in transit for directory service implementations at a classified confidentiality level when replication data traverses a network cleared to a lower level than the data.DISA Windows Server 2019 STIG v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN19-SO-000290 - Windows Server 2019 Kerberos encryption types must be configured to prevent the use of DES and RC4 encryption suites.DISA Windows Server 2019 STIG v2r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN19-SO-000290 - Windows Server 2019 Kerberos encryption types must be configured to prevent the use of DES and RC4 encryption suites.DISA Windows Server 2019 STIG v2r2Windows

SYSTEM AND COMMUNICATIONS PROTECTION