Item Search

NameAudit NamePluginCategory
1.2 UBTU-22-212010CIS Ubuntu Linux 22.04 LTS STIG v1.0.0 CAT IUnix

ACCESS CONTROL

1.32 UBTU-24-102000CIS Ubuntu Linux 24.04 LTS STIG v1.0.0 CAT IUnix

ACCESS CONTROL

1.346 RHEL-09-611195CIS Red Hat Enterprise Linux 9 STIG v1.0.0 CAT IIUnix

ACCESS CONTROL

ALMA-09-006290 - AlmaLinux OS 9 must require a boot loader password.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

ACCESS CONTROL

APPL-15-002001 - The macOS system must disable Server Message Block (SMB) sharing.DISA Apple macOS 15 (Sequoia) STIG v1r4Unix

ACCESS CONTROL

APPL-15-002050 - The macOS system must disable Screen Sharing and Apple Remote Desktop.DISA Apple macOS 15 (Sequoia) STIG v1r4Unix

ACCESS CONTROL

CD12-00-000900 - PostgreSQL must enforce approved authorizations for logical access to information and system resources in accordance with applicable access control policies.DISA STIG Crunchy Data PostgreSQL OS v3r1Unix

ACCESS CONTROL

CNTR-K8-000350 - The Kubernetes API server must have the secure port set.DISA STIG Kubernetes v2r3Unix

ACCESS CONTROL

CNTR-K8-000360 - The Kubernetes API server must have anonymous authentication disabled.DISA STIG Kubernetes v2r3Unix

ACCESS CONTROL

CNTR-K8-000470 - The Kubernetes API server must have Alpha APIs disabled.DISA STIG Kubernetes v2r3Unix

ACCESS CONTROL

CNTR-R2-000110 - The Kubernetes Kubelet must have anonymous authentication disabled.DISA Rancher Government Solutions RKE2 STIG v2r3Unix

ACCESS CONTROL

CNTR-R2-000120 - The Kubernetes API server must have the insecure port flag disabled.DISA Rancher Government Solutions RKE2 STIG v2r3Unix

ACCESS CONTROL

CNTR-R2-000160 - The Kubernetes API server must have anonymous authentication disabled.DISA Rancher Government Solutions RKE2 STIG v2r3Unix

ACCESS CONTROL

DTAM144 - McAfee VirusScan Access Protection Rules Common Standard Protection must be set to prevent termination of McAfee processes.DISA McAfee VirusScan 8.8 Local Client STIG v6r1Windows

ACCESS CONTROL

DTAM144 - McAfee VirusScan Access Protection: Common Standard Protection must be set to prevent termination of McAfee processes.DISA McAfee VirusScan 8.8 Managed Client STIG v6r1Windows

ACCESS CONTROL

EX19-ED-000016 - Exchange servers must use approved DOD certificates.DISA Microsoft Exchange 2019 Edge Server STIG v2r2Windows

ACCESS CONTROL

GEN000020 - The system must require authentication upon booting into single-user and maintenance modes.DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN000020 - The system must require authentication upon booting into single-user and maintenance modes.DISA STIG Solaris 10 X86 v2r4Unix

ACCESS CONTROL

GEN000020 - The system must require authentication upon booting into single-user and maintenance modes.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL

GEN008620 - BIOS or system controllers supporting password protection must have administrator accounts/passwords configured and no others.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN008620 - System BIOS or system controllers supporting password protection must have admin accounts/passwords configured, and no others.DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN008620 - System BIOS or system controllers supporting password protection must have administrator accounts/passwords configured, and no others.DISA STIG Solaris 10 SPARC v2r4Unix

ACCESS CONTROL

GEN008620 - System BIOS or system controllers supporting password protection must have administrator accounts/passwords configured, and no others.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL

GEN008700 - The system boot loader must require authentication - '/boot/grub/grub.conf'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL

GEN008700 - The system boot loader must require authentication - '/boot/grub/menu.lst'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL

GEN008700 - The system boot loader must require authentication - '/boot/grub/menu.lst'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN008700 - The system boot loader must require authentication.DISA STIG Solaris 10 X86 v2r4Unix

ACCESS CONTROL

GEN008710 - The system boot loader must protect passwords using an MD5 or stronger cryptographic hash.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

MADB-10-000300 - MariaDB must enforce approved authorizations for logical access to information and system resources in accordance with applicable access control policies.DISA MariaDB Enterprise 10.x v2r3 DBMySQLDB

ACCESS CONTROL

MD7X-00-000300 MongoDB must enforce approved authorizations for logical access to information and system resources in accordance with applicable access control policies.DISA MongoDB Enterprise Advanced 7.x STIG v1r1MongoDB

ACCESS CONTROL

OL08-00-010149 - OL 8 operating systems booted with a BIOS must have a unique name for the grub superusers account when booting into single-user and maintenance modes.DISA Oracle Linux 8 STIG v2r5Unix

ACCESS CONTROL

OL08-00-010151 - OL 8 operating systems must require authentication upon booting into rescue mode.DISA Oracle Linux 8 STIG v2r5Unix

ACCESS CONTROL

OL08-00-010152 - OL 8 operating systems must require authentication upon booting into emergency mode.DISA Oracle Linux 8 STIG v2r5Unix

ACCESS CONTROL

OL09-00-001115 - OL 9 must require a boot loader superuser password.DISA Oracle Linux 9 STIG v1r2Unix

ACCESS CONTROL

PHTN-67-000124 - The Photon operating system must enforce approved authorizations for logical access to information and system resources in accordance with applicable access control policies.DISA STIG VMware vSphere 6.7 Photon OS v1r6Unix

ACCESS CONTROL

RHEL-08-010151 - RHEL 8 operating systems must require authentication upon booting into rescue mode.DISA Red Hat Enterprise Linux 8 STIG v2r4Unix

ACCESS CONTROL

RHEL-08-010152 - RHEL 8 operating systems must require authentication upon booting into emergency mode.DISA Red Hat Enterprise Linux 8 STIG v2r4Unix

ACCESS CONTROL

RHEL-09-212010 - RHEL 9 must require a boot loader superuser password.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

ACCESS CONTROL

SYMP-NM-000020 - Symantec ProxySG must be configured to enforce user authorization to implement least privilege.DISA Symantec ProxySG Benchmark NDM v1r2BlueCoat

ACCESS CONTROL

VCLU-80-000005 The vCenter Lookup service cookies must have secure flag set.DISA VMware vSphere 8.0 vCenter Appliance Lookup Service STIG v2r1Unix

ACCESS CONTROL

VCLU-80-000129 The vCenter Lookup service cookies must have 'http-only' flag set.DISA VMware vSphere 8.0 vCenter Appliance Lookup Service STIG v2r1Unix

ACCESS CONTROL

VCUI-80-000005 The vCenter UI service cookies must have secure flag set.DISA VMware vSphere 8.0 vCenter Appliance User Interface (UI) STIG v2r1Unix

ACCESS CONTROL

WN11-UR-000075 - The 'Deny log on as a batch job' user right on domain-joined workstations must be configured to prevent access from highly privileged domain accounts.DISA Microsoft Windows 11 STIG v2r4Windows

ACCESS CONTROL

WN11-UR-000085 - The 'Deny log on locally' user right on workstations must be configured to prevent access from highly privileged domain accounts on domain systems and unauthenticated access on all systems.DISA Microsoft Windows 11 STIG v2r4Windows

ACCESS CONTROL

WN22-DC-000340 - Windows Server 2022 Access this computer from the network user right must only be assigned to the Administrators, Authenticated Users, and Enterprise Domain Controllers groups on domain controllers.DISA Microsoft Windows Server 2022 STIG v2r5Windows

ACCESS CONTROL

WN22-DC-000390 - Windows Server 2022 Deny log on as a service user right must be configured to include no accounts or groups (blank) on domain controllers.DISA Microsoft Windows Server 2022 STIG v2r5Windows

ACCESS CONTROL

WN22-MS-000080 - Windows Server 2022 Deny access to this computer from the network user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts and local accounts and from unauthenticated access on all systems.DISA Microsoft Windows Server 2022 STIG v2r5Windows

ACCESS CONTROL

WN22-MS-000100 - Windows Server 2022 Deny log on as a service user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts. No other groups or accounts must be assigned this right.DISA Microsoft Windows Server 2022 STIG v2r5Windows

ACCESS CONTROL

WN22-MS-000110 - Windows Server 2022 Deny log on locally user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts and from unauthenticated access on all systems.DISA Microsoft Windows Server 2022 STIG v2r5Windows

ACCESS CONTROL

WN22-UR-000030 - Windows Server 2022 Allow log on locally user right must only be assigned to the Administrators group.DISA Microsoft Windows Server 2022 STIG v2r5Windows

ACCESS CONTROL