Item Search

NameAudit NamePluginCategory
CNTR-K8-001620 - Kubernetes Kubelet must enable kernel protection.DISA STIG Kubernetes v1r2Unix
OL08-00-010170 - OL 8 must use a Linux Security Module configured to enforce limits on system services.DISA Oracle Linux 8 STIG v1r10Unix
OL08-00-010171 - OL 8 must have the 'policycoreutils' package installed.DISA Oracle Linux 8 STIG v1r10Unix
OL08-00-010421 - OL 8 must clear the page allocator to prevent use-after-free attacks - grub2-editenvDISA Oracle Linux 8 STIG v1r4Unix
OL08-00-010421 - OL 8 must clear the page allocator to prevent use-after-free attacks - grub2-editenvDISA Oracle Linux 8 STIG v1r6Unix
OL08-00-010422 - OL 8 must disable virtual syscalls - /etc/default/grubDISA Oracle Linux 8 STIG v1r4Unix
OL08-00-010422 - OL 8 must disable virtual syscalls. - /etc/default/grubDISA Oracle Linux 8 STIG v1r1Unix
OL08-00-010423 - OL 8 must clear SLUB/SLAB objects to prevent use-after-free attacks - grub2-editenvDISA Oracle Linux 8 STIG v1r2Unix
OL08-00-010423 - OL 8 must clear SLUB/SLAB objects to prevent use-after-free attacks. - grub2-editenvDISA Oracle Linux 8 STIG v1r1Unix
RHEL-08-010170 - RHEL 8 must use a Linux Security Module configured to enforce limits on system services.DISA Red Hat Enterprise Linux 8 STIG v1r6Unix
RHEL-08-010170 - RHEL 8 must use a Linux Security Module configured to enforce limits on system services.DISA Red Hat Enterprise Linux 8 STIG v1r9Unix
RHEL-08-010170 - RHEL 8 must use a Linux Security Module configured to enforce limits on system services.DISA Red Hat Enterprise Linux 8 STIG v1r11Unix
RHEL-08-010171 - RHEL 8 must have policycoreutils package installed.DISA Red Hat Enterprise Linux 8 STIG v1r6Unix
RHEL-08-010171 - RHEL 8 must have policycoreutils package installed.DISA Red Hat Enterprise Linux 8 STIG v1r9Unix
RHEL-08-010171 - RHEL 8 must have policycoreutils package installed.DISA Red Hat Enterprise Linux 8 STIG v1r1Unix
RHEL-08-010171 - RHEL 8 must have policycoreutils package installed.DISA Red Hat Enterprise Linux 8 STIG v1r7Unix
RHEL-08-010421 - RHEL 8 must clear the page allocator to prevent use-after-free attacks - /etc/default/grubDISA Red Hat Enterprise Linux 8 STIG v1r8Unix
RHEL-08-010421 - RHEL 8 must clear the page allocator to prevent use-after-free attacks - /etc/default/grubDISA Red Hat Enterprise Linux 8 STIG v1r5Unix
RHEL-08-010421 - RHEL 8 must clear the page allocator to prevent use-after-free attacks - /etc/default/grubDISA Red Hat Enterprise Linux 8 STIG v1r7Unix
RHEL-08-010421 - RHEL 8 must clear the page allocator to prevent use-after-free attacks - grub2-editenvDISA Red Hat Enterprise Linux 8 STIG v1r11Unix
RHEL-08-010421 - RHEL 8 must clear the page allocator to prevent use-after-free attacks - grub2-editenvDISA Red Hat Enterprise Linux 8 STIG v1r5Unix
RHEL-08-010421 - RHEL 8 must clear the page allocator to prevent use-after-free attacks. - /etc/default/grubDISA Red Hat Enterprise Linux 8 STIG v1r1Unix
RHEL-08-010422 - RHEL 8 must disable virtual syscalls. - /etc/default/grubDISA Red Hat Enterprise Linux 8 STIG v1r1Unix
RHEL-08-010422 - RHEL 8 must disable virtual syscalls. - grub2-editenvDISA Red Hat Enterprise Linux 8 STIG v1r1Unix
RHEL-08-010423 - RHEL 8 must clear SLUB/SLAB objects to prevent use-after-free attacks - /etc/default/grubDISA Red Hat Enterprise Linux 8 STIG v1r8Unix
RHEL-08-010423 - RHEL 8 must clear SLUB/SLAB objects to prevent use-after-free attacks - /etc/default/grubDISA Red Hat Enterprise Linux 8 STIG v1r11Unix
RHEL-08-010423 - RHEL 8 must clear SLUB/SLAB objects to prevent use-after-free attacks - grub2-editenvDISA Red Hat Enterprise Linux 8 STIG v1r9Unix
RHEL-08-010423 - RHEL 8 must clear SLUB/SLAB objects to prevent use-after-free attacks - grub2-editenvDISA Red Hat Enterprise Linux 8 STIG v1r11Unix
RHEL-08-010423 - RHEL 8 must clear SLUB/SLAB objects to prevent use-after-free attacks - grub2-editenvDISA Red Hat Enterprise Linux 8 STIG v1r6Unix
UBTU-20-010012 - The Ubuntu operating system must ensure only users who need access to security functions are part of sudo group.DISA STIG Ubuntu 20.04 LTS v1r1Unix
UBTU-20-010012 - The Ubuntu operating system must ensure only users who need access to security functions are part of sudo group.DISA STIG Ubuntu 20.04 LTS v1r5Unix
VCTR-67-000051 - The vCenter Server users must have the correct roles assigned.DISA STIG VMware vSphere 6.7 vCenter v1r2VMware
VCTR-67-000051 - The vCenter Server users must have the correct roles assigned.DISA STIG VMware vSphere 6.7 vCenter v1r1VMware
WN11-CC-000037 - Local administrator accounts must have their privileged token filtered to prevent elevated privileges from being used over the network on domain systems.DISA Windows 11 STIG v1r2Windows
WN11-CC-000037 - Local administrator accounts must have their privileged token filtered to prevent elevated privileges from being used over the network on domain systems.DISA Windows 11 STIG v1r5Windows
WN11-CC-000200 - Administrator accounts must not be enumerated during elevation.DISA Windows 11 STIG v1r1Windows
WN11-CC-000200 - Administrator accounts must not be enumerated during elevation.DISA Windows 11 STIG v1r4Windows
WN11-SO-000250 - User Account Control must prompt administrators for consent on the secure desktop.DISA Windows 11 STIG v1r1Windows
WN11-SO-000250 - User Account Control must prompt administrators for consent on the secure desktop.DISA Windows 11 STIG v1r2Windows
WN11-SO-000250 - User Account Control must prompt administrators for consent on the secure desktop.DISA Windows 11 STIG v1r4Windows
WN11-SO-000250 - User Account Control must prompt administrators for consent on the secure desktop.DISA Windows 11 STIG v1r5Windows
WN11-SO-000260 - User Account Control must be configured to detect application installations and prompt for elevation.DISA Windows 11 STIG v1r1Windows
WN11-SO-000265 - User Account Control must only elevate UIAccess applications that are installed in secure locations.DISA Windows 11 STIG v1r1Windows
WN11-SO-000265 - User Account Control must only elevate UIAccess applications that are installed in secure locations.DISA Windows 11 STIG v1r2Windows
WN11-SO-000275 - User Account Control must virtualize file and registry write failures to per-user locations.DISA Windows 11 STIG v1r5Windows
WN22-MS-000020 - Windows Server 2022 local administrator accounts must have their privileged token filtered to prevent elevated privileges from being used over the network on domain-joined member servers.DISA Windows Server 2022 STIG v1r5Windows
WN22-SO-000390 - Windows Server 2022 UIAccess applications must not be allowed to prompt for elevation without using the secure desktop.DISA Windows Server 2022 STIG v1r3Windows
WN22-SO-000420 - Windows Server 2022 User Account Control (UAC) must be configured to detect application installations and prompt for elevation.DISA Windows Server 2022 STIG v1r5Windows
WN22-SO-000430 - Windows Server 2022 User Account Control (UAC) must only elevate UIAccess applications that are installed in secure locations.DISA Windows Server 2022 STIG v1r1Windows
WN22-SO-000430 - Windows Server 2022 User Account Control (UAC) must only elevate UIAccess applications that are installed in secure locations.DISA Windows Server 2022 STIG v1r3Windows