Item Search

NameAudit NamePluginCategory
O121-C2-019600 - The system must verify there have not been unauthorized changes to the DBMS software and information.DISA STIG Oracle 12c v2r9 DatabaseOracleDB

SYSTEM AND INFORMATION INTEGRITY

OL6-00-000008 - Vendor-provided cryptographic certificates must be installed to verify the integrity of system software.DISA STIG Oracle Linux 6 v1r18Unix

SYSTEM AND INFORMATION INTEGRITY

OL6-00-000013 - The system package management tool must cryptographically verify the authenticity of system software packages during installation.DISA STIG Oracle Linux 6 v1r18Unix

SYSTEM AND INFORMATION INTEGRITY

OL6-00-000015 - The system package management tool must cryptographically verify the authenticity of all software packages during installation.DISA STIG Oracle Linux 6 v1r18Unix

SYSTEM AND INFORMATION INTEGRITY

OL07-00-020050 - The Oracle Linux operating system must prevent the installation of software, patches, service packs, device drivers, or operating system components from a repository without verification they have been digitally signed using a certificate that is issued by a Certificate Authority (CA) that is recognized and approved by the organization - CA that is recognized and approved by the organization.DISA Oracle Linux 7 STIG v2r4Unix

SYSTEM AND INFORMATION INTEGRITY

OL07-00-020050 - The Oracle Linux operating system must prevent the installation of software, patches, service packs, device drivers, or operating system components from a repository without verification they have been digitally signed using a certificate that is issued by a Certificate Authority (CA) that is recognized and approved by the organization - CA that is recognized and approved by the organization.DISA Oracle Linux 7 STIG v2r5Unix

SYSTEM AND INFORMATION INTEGRITY

OL07-00-020060 - The Oracle Linux operating system must prevent the installation of software, patches, service packs, device drivers, or operating system components of local packages without verification they have been digitally signed using a certificate that is issued by a Certificate Authority (CA) that is recognized and approved by the organization - CA that is recognized and approved by the organization.DISA Oracle Linux 7 STIG v2r5Unix

SYSTEM AND INFORMATION INTEGRITY

RHEL-06-000008 - Vendor-provided cryptographic certificates must be installed to verify the integrity of system software.DISA Red Hat Enterprise Linux 6 STIG v2r1Unix

SYSTEM AND INFORMATION INTEGRITY

RHEL-06-000013 - The system package management tool must cryptographically verify the authenticity of system software packages during installation.DISA Red Hat Enterprise Linux 6 STIG v2r1Unix

SYSTEM AND INFORMATION INTEGRITY

RHEL-06-000015 - The system package management tool must cryptographically verify the authenticity of all software packages during installation.DISA Red Hat Enterprise Linux 6 STIG v2r1Unix

SYSTEM AND INFORMATION INTEGRITY

RHEL-07-020050 - The Red Hat Enterprise Linux operating system must prevent the installation of software, patches, service packs, device drivers, or operating system components from a repository without verification they have been digitally signed using a certificate that is issued by a Certificate Authority (CA) that is recognized and approved by the organization.DISA Red Hat Enterprise Linux 7 STIG v3r5Unix

SYSTEM AND INFORMATION INTEGRITY

RHEL-07-020050 - The Red Hat Enterprise Linux operating system must prevent the installation of software, patches, service packs, device drivers, or operating system components from a repository without verification they have been digitally signed using a certificate that is issued by a Certificate Authority (CA) that is recognized and approved by the organization.DISA Red Hat Enterprise Linux 7 STIG v3r4Unix

SYSTEM AND INFORMATION INTEGRITY

RHEL-07-020060 - The Red Hat Enterprise Linux operating system must prevent the installation of software, patches, service packs, device drivers, or operating system components of local packages without verification they have been digitally signed using a certificate that is issued by a Certificate Authority (CA) that is recognized and approved by the organization.DISA Red Hat Enterprise Linux 7 STIG v3r7Unix

SYSTEM AND INFORMATION INTEGRITY

RHEL-07-020060 - The Red Hat Enterprise Linux operating system must prevent the installation of software, patches, service packs, device drivers, or operating system components of local packages without verification they have been digitally signed using a certificate that is issued by a Certificate Authority (CA) that is recognized and approved by the organization.DISA Red Hat Enterprise Linux 7 STIG v3r4Unix

SYSTEM AND INFORMATION INTEGRITY

RHEL-07-020060 - The Red Hat Enterprise Linux operating system must prevent the installation of software, patches, service packs, device drivers, or operating system components of local packages without verification they have been digitally signed using a certificate that is issued by a Certificate Authority (CA) that is recognized and approved by the organization.DISA Red Hat Enterprise Linux 7 STIG v3r5Unix

SYSTEM AND INFORMATION INTEGRITY

SLES-12-010550 - The SUSE operating system tool zypper must have gpgcheck enabled.DISA SLES 12 STIG v2r2Unix

SYSTEM AND INFORMATION INTEGRITY

SLES-12-010550 - The SUSE operating system tool zypper must have gpgcheck enabled.DISA SLES 12 STIG v2r1Unix

SYSTEM AND INFORMATION INTEGRITY

SLES-15-010430 - The SUSE operating system tool zypper must have gpgcheck enabled.DISA SLES 15 STIG v1r1Unix

SYSTEM AND INFORMATION INTEGRITY

SLES-15-010430 - The SUSE operating system tool zypper must have gpgcheck enabled.DISA SLES 15 STIG v1r3Unix

SYSTEM AND INFORMATION INTEGRITY

SOL-11.1-020020 - The system must verify that package updates are digitally signed.DISA STIG Solaris 11 SPARC v2r2Unix

SYSTEM AND INFORMATION INTEGRITY

SOL-11.1-020030 - The operating system must protect audit tools from unauthorized access.DISA STIG Solaris 11 X86 v2r4Unix

SYSTEM AND INFORMATION INTEGRITY

SOL-11.1-020030 - The operating system must protect audit tools from unauthorized access.DISA STIG Solaris 11 SPARC v2r4Unix

SYSTEM AND INFORMATION INTEGRITY

SOL-11.1-020040 - The operating system must protect audit tools from unauthorized modification.DISA STIG Solaris 11 SPARC v2r2Unix

SYSTEM AND INFORMATION INTEGRITY

SOL-11.1-020040 - The operating system must protect audit tools from unauthorized modification.DISA STIG Solaris 11 SPARC v2r4Unix

SYSTEM AND INFORMATION INTEGRITY

SOL-11.1-020050 - The operating system must protect audit tools from unauthorized deletion.DISA STIG Solaris 11 SPARC v2r4Unix

SYSTEM AND INFORMATION INTEGRITY

SOL-11.1-020050 - The operating system must protect audit tools from unauthorized deletion.DISA STIG Solaris 11 SPARC v2r2Unix

SYSTEM AND INFORMATION INTEGRITY

SOL-11.1-020050 - The operating system must protect audit tools from unauthorized deletion.DISA STIG Solaris 11 X86 v2r4Unix

SYSTEM AND INFORMATION INTEGRITY

SOL-11.1-020080 - System packages must be configured with the vendor-provided files, permissions, and ownerships.DISA STIG Solaris 11 X86 v2r4Unix

SYSTEM AND INFORMATION INTEGRITY

SOL-11.1-020080 - System packages must be configured with the vendor-provided files, permissions, and ownerships.DISA STIG Solaris 11 SPARC v2r2Unix

SYSTEM AND INFORMATION INTEGRITY

SOL-11.1-020080 - System packages must be configured with the vendor-provided files, permissions, and ownerships.DISA STIG Solaris 11 SPARC v2r4Unix

SYSTEM AND INFORMATION INTEGRITY

SOL-11.1-020220 - The operating system must be configured to provide essential capabilities.DISA STIG Solaris 11 X86 v2r4Unix

SYSTEM AND INFORMATION INTEGRITY

SOL-11.1-020230 - The operating system must employ automated mechanisms to prevent program execution in accordance with the organization-defined specifications.DISA STIG Solaris 11 SPARC v2r4Unix

SYSTEM AND INFORMATION INTEGRITY

SOL-11.1-020230 - The operating system must employ automated mechanisms to prevent program execution in accordance with the organization-defined specifications.DISA STIG Solaris 11 X86 v2r4Unix

SYSTEM AND INFORMATION INTEGRITY

SOL-11.1-020230 - The operating system must employ automated mechanisms to prevent program execution in accordance with the organization-defined specifications.DISA STIG Solaris 11 SPARC v2r2Unix

SYSTEM AND INFORMATION INTEGRITY

SOL-11.1-060150 - The operating system must employ cryptographic mechanisms to protect information in storage.DISA STIG Solaris 11 X86 v2r4Unix

SYSTEM AND INFORMATION INTEGRITY

SOL-11.1-060160 - The operating system must protect the confidentiality and integrity of information at rest.DISA STIG Solaris 11 X86 v2r4Unix

SYSTEM AND INFORMATION INTEGRITY

SOL-11.1-060160 - The operating system must protect the confidentiality and integrity of information at rest.DISA STIG Solaris 11 SPARC v2r2Unix

SYSTEM AND INFORMATION INTEGRITY

SOL-11.1-060160 - The operating system must protect the confidentiality and integrity of information at rest.DISA STIG Solaris 11 SPARC v2r4Unix

SYSTEM AND INFORMATION INTEGRITY

SOL-11.1-060170 - The operating system must employ cryptographic mechanisms to prevent unauthorized disclosure of information at rest unless otherwise protected by alternative physical measures.DISA STIG Solaris 11 X86 v2r4Unix

SYSTEM AND INFORMATION INTEGRITY

SOL-11.1-060170 - The operating system must employ cryptographic mechanisms to prevent unauthorized disclosure of information at rest unless otherwise protected by alternative physical measures.DISA STIG Solaris 11 SPARC v2r4Unix

SYSTEM AND INFORMATION INTEGRITY

SQL2-00-015350 - Software, applications, and configuration files that are part of, or related to, the SQL Server 2012 installation must be monitored to discover unauthorized changes.DISA STIG SQL Server 2012 Database OS Audit v1r20Windows

AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY