| 1.2 UBTU-22-212010 | CIS Ubuntu Linux 22.04 LTS STIG v1.0.0 CAT I | Unix | ACCESS CONTROL |
| 1.32 UBTU-24-102000 | CIS Ubuntu Linux 24.04 LTS STIG v1.0.0 CAT I | Unix | ACCESS CONTROL |
| 1.346 RHEL-09-611195 | CIS Red Hat Enterprise Linux 9 STIG v1.0.0 CAT II | Unix | ACCESS CONTROL |
| ALMA-09-006290 - AlmaLinux OS 9 must require a boot loader password. | DISA CloudLinux AlmaLinux OS 9 STIG v1r2 | Unix | ACCESS CONTROL |
| APPL-15-002001 - The macOS system must disable Server Message Block (SMB) sharing. | DISA Apple macOS 15 (Sequoia) STIG v1r4 | Unix | ACCESS CONTROL |
| APPL-15-002050 - The macOS system must disable Screen Sharing and Apple Remote Desktop. | DISA Apple macOS 15 (Sequoia) STIG v1r4 | Unix | ACCESS CONTROL |
| CD12-00-000900 - PostgreSQL must enforce approved authorizations for logical access to information and system resources in accordance with applicable access control policies. | DISA STIG Crunchy Data PostgreSQL OS v3r1 | Unix | ACCESS CONTROL |
| CNTR-K8-000350 - The Kubernetes API server must have the secure port set. | DISA STIG Kubernetes v2r3 | Unix | ACCESS CONTROL |
| CNTR-K8-000360 - The Kubernetes API server must have anonymous authentication disabled. | DISA STIG Kubernetes v2r3 | Unix | ACCESS CONTROL |
| CNTR-K8-000470 - The Kubernetes API server must have Alpha APIs disabled. | DISA STIG Kubernetes v2r3 | Unix | ACCESS CONTROL |
| CNTR-R2-000110 - The Kubernetes Kubelet must have anonymous authentication disabled. | DISA Rancher Government Solutions RKE2 STIG v2r3 | Unix | ACCESS CONTROL |
| CNTR-R2-000120 - The Kubernetes API server must have the insecure port flag disabled. | DISA Rancher Government Solutions RKE2 STIG v2r3 | Unix | ACCESS CONTROL |
| CNTR-R2-000160 - The Kubernetes API server must have anonymous authentication disabled. | DISA Rancher Government Solutions RKE2 STIG v2r3 | Unix | ACCESS CONTROL |
| DTAM144 - McAfee VirusScan Access Protection Rules Common Standard Protection must be set to prevent termination of McAfee processes. | DISA McAfee VirusScan 8.8 Local Client STIG v6r1 | Windows | ACCESS CONTROL |
| DTAM144 - McAfee VirusScan Access Protection: Common Standard Protection must be set to prevent termination of McAfee processes. | DISA McAfee VirusScan 8.8 Managed Client STIG v6r1 | Windows | ACCESS CONTROL |
| EX19-ED-000016 - Exchange servers must use approved DOD certificates. | DISA Microsoft Exchange 2019 Edge Server STIG v2r2 | Windows | ACCESS CONTROL |
| GEN000020 - The system must require authentication upon booting into single-user and maintenance modes. | DISA STIG AIX 6.1 v1r14 | Unix | ACCESS CONTROL |
| GEN000020 - The system must require authentication upon booting into single-user and maintenance modes. | DISA STIG Solaris 10 X86 v2r4 | Unix | ACCESS CONTROL |
| GEN000020 - The system must require authentication upon booting into single-user and maintenance modes. | DISA STIG for Oracle Linux 5 v2r1 | Unix | ACCESS CONTROL |
| GEN008620 - BIOS or system controllers supporting password protection must have administrator accounts/passwords configured and no others. | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
| GEN008620 - System BIOS or system controllers supporting password protection must have admin accounts/passwords configured, and no others. | DISA STIG AIX 6.1 v1r14 | Unix | ACCESS CONTROL |
| GEN008620 - System BIOS or system controllers supporting password protection must have administrator accounts/passwords configured, and no others. | DISA STIG Solaris 10 SPARC v2r4 | Unix | ACCESS CONTROL |
| GEN008620 - System BIOS or system controllers supporting password protection must have administrator accounts/passwords configured, and no others. | DISA STIG for Oracle Linux 5 v2r1 | Unix | ACCESS CONTROL |
| GEN008700 - The system boot loader must require authentication - '/boot/grub/grub.conf' | DISA STIG for Oracle Linux 5 v2r1 | Unix | ACCESS CONTROL |
| GEN008700 - The system boot loader must require authentication - '/boot/grub/menu.lst' | DISA STIG for Oracle Linux 5 v2r1 | Unix | ACCESS CONTROL |
| GEN008700 - The system boot loader must require authentication - '/boot/grub/menu.lst' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
| GEN008700 - The system boot loader must require authentication. | DISA STIG Solaris 10 X86 v2r4 | Unix | ACCESS CONTROL |
| GEN008710 - The system boot loader must protect passwords using an MD5 or stronger cryptographic hash. | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
| MADB-10-000300 - MariaDB must enforce approved authorizations for logical access to information and system resources in accordance with applicable access control policies. | DISA MariaDB Enterprise 10.x v2r3 DB | MySQLDB | ACCESS CONTROL |
| MD7X-00-000300 MongoDB must enforce approved authorizations for logical access to information and system resources in accordance with applicable access control policies. | DISA MongoDB Enterprise Advanced 7.x STIG v1r1 | MongoDB | ACCESS CONTROL |
| OL08-00-010149 - OL 8 operating systems booted with a BIOS must have a unique name for the grub superusers account when booting into single-user and maintenance modes. | DISA Oracle Linux 8 STIG v2r5 | Unix | ACCESS CONTROL |
| OL08-00-010151 - OL 8 operating systems must require authentication upon booting into rescue mode. | DISA Oracle Linux 8 STIG v2r5 | Unix | ACCESS CONTROL |
| OL08-00-010152 - OL 8 operating systems must require authentication upon booting into emergency mode. | DISA Oracle Linux 8 STIG v2r5 | Unix | ACCESS CONTROL |
| OL09-00-001115 - OL 9 must require a boot loader superuser password. | DISA Oracle Linux 9 STIG v1r2 | Unix | ACCESS CONTROL |
| PHTN-67-000124 - The Photon operating system must enforce approved authorizations for logical access to information and system resources in accordance with applicable access control policies. | DISA STIG VMware vSphere 6.7 Photon OS v1r6 | Unix | ACCESS CONTROL |
| RHEL-08-010151 - RHEL 8 operating systems must require authentication upon booting into rescue mode. | DISA Red Hat Enterprise Linux 8 STIG v2r4 | Unix | ACCESS CONTROL |
| RHEL-08-010152 - RHEL 8 operating systems must require authentication upon booting into emergency mode. | DISA Red Hat Enterprise Linux 8 STIG v2r4 | Unix | ACCESS CONTROL |
| RHEL-09-212010 - RHEL 9 must require a boot loader superuser password. | DISA Red Hat Enterprise Linux 9 STIG v2r4 | Unix | ACCESS CONTROL |
| SYMP-NM-000020 - Symantec ProxySG must be configured to enforce user authorization to implement least privilege. | DISA Symantec ProxySG Benchmark NDM v1r2 | BlueCoat | ACCESS CONTROL |
| VCLU-80-000005 The vCenter Lookup service cookies must have secure flag set. | DISA VMware vSphere 8.0 vCenter Appliance Lookup Service STIG v2r1 | Unix | ACCESS CONTROL |
| VCLU-80-000129 The vCenter Lookup service cookies must have 'http-only' flag set. | DISA VMware vSphere 8.0 vCenter Appliance Lookup Service STIG v2r1 | Unix | ACCESS CONTROL |
| VCUI-80-000005 The vCenter UI service cookies must have secure flag set. | DISA VMware vSphere 8.0 vCenter Appliance User Interface (UI) STIG v2r1 | Unix | ACCESS CONTROL |
| WN11-UR-000075 - The 'Deny log on as a batch job' user right on domain-joined workstations must be configured to prevent access from highly privileged domain accounts. | DISA Microsoft Windows 11 STIG v2r4 | Windows | ACCESS CONTROL |
| WN11-UR-000085 - The 'Deny log on locally' user right on workstations must be configured to prevent access from highly privileged domain accounts on domain systems and unauthenticated access on all systems. | DISA Microsoft Windows 11 STIG v2r4 | Windows | ACCESS CONTROL |
| WN22-DC-000340 - Windows Server 2022 Access this computer from the network user right must only be assigned to the Administrators, Authenticated Users, and Enterprise Domain Controllers groups on domain controllers. | DISA Microsoft Windows Server 2022 STIG v2r5 | Windows | ACCESS CONTROL |
| WN22-DC-000390 - Windows Server 2022 Deny log on as a service user right must be configured to include no accounts or groups (blank) on domain controllers. | DISA Microsoft Windows Server 2022 STIG v2r5 | Windows | ACCESS CONTROL |
| WN22-MS-000080 - Windows Server 2022 Deny access to this computer from the network user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts and local accounts and from unauthenticated access on all systems. | DISA Microsoft Windows Server 2022 STIG v2r5 | Windows | ACCESS CONTROL |
| WN22-MS-000100 - Windows Server 2022 Deny log on as a service user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts. No other groups or accounts must be assigned this right. | DISA Microsoft Windows Server 2022 STIG v2r5 | Windows | ACCESS CONTROL |
| WN22-MS-000110 - Windows Server 2022 Deny log on locally user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts and from unauthenticated access on all systems. | DISA Microsoft Windows Server 2022 STIG v2r5 | Windows | ACCESS CONTROL |
| WN22-UR-000030 - Windows Server 2022 Allow log on locally user right must only be assigned to the Administrators group. | DISA Microsoft Windows Server 2022 STIG v2r5 | Windows | ACCESS CONTROL |