Item Search

NameAudit NamePluginCategory
BIND-9X-000001 - A BIND 9.x server implementation must be running in a chroot(ed) directory structure.DISA BIND 9.x STIG v2r3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

GEN002300 - Device files used for backup must only be readable and/or writable by root or the backup user.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

GEN002320 - Audio devices must have mode 0660 or less permissive - '/dev/audio*'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

GEN002320 - Audio devices must have mode 0660 or less permissive - '/dev/snd/*'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

GEN002330 - Audio devices must not have extended ACLs - '/dev/snd/*'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

GEN002340 - Audio devices must be owned by root - '/dev/snd/*'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

GEN002360 - Audio devices must be group-owned by root, sys, bin, or system - '/dev/audio*'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

GEN002360 - Audio devices must be group-owned by root, sys, bin, or system - '/dev/snd/*'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

GEN002420 - Removable media, remote file systems, and any file system not containing approved setuid files must be mounted with the nosuid option - nosuid option.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

GEN002520 - All public directories must be owned by root or an application account.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

GEN002540 - All public directories must be group-owned by root, sys, bin, or an application group.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

GEN003581 - Network interfaces must not be configured to allow user control.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

GEN004400 - Files executed through a mail aliases file must be owned by root and must reside within a directory owned and writable only by root.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

GEN004410 - Files executed through a mail aliases file must be group-owned by root, bin, sys, or system, and must reside within a directory group-owned by root, bin, sys, or system.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

GEN004420 - Files executed through a mail aliases file must have mode 0755 or less permissive.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

GEN004480 - The SMTP service log file must be owned by root.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

GEN004500 - The SMTP service log file must have mode 0644 or less permissive.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

GEN004510 - The SMTP service log file must not have an extended ACL.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

GEN004880 - The ftpusers file must exist.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

GEN004900 - The ftpusers file must contain account names not allowed to use FTP.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

GEN004920 - The ftpusers file must be owned by root - '/etc/ftpusers'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

GEN004930 - The ftpusers file must be group-owned by root, bin, sys, or system - '/etc/ftpusers'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

GEN004930 - The ftpusers file must be group-owned by root, bin, sys, or system - '/etc/vsftpd.ftpusers'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

GEN004930 - The ftpusers file must be group-owned by root, bin, sys, or system - '/etc/vsftpd/ftpusers'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

GEN004940 - The ftpusers file must have mode 0640 or less permissive - '/etc/vsftpd/ftpusers'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

GEN004950 - The ftpusers file must not have an extended ACL - '/etc/ftpusers'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

GEN004950 - The ftpusers file must not have an extended ACL - '/etc/vsftpd.ftpusers'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

GEN004950 - The ftpusers file must not have an extended ACL - '/etc/vsftpd/ftpusers'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

GEN005000 - Anonymous FTP accounts must not have a functional shell.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

GEN005040 - All FTP users must have a default umask of 077 - '/etc/vsftpd/vsftpd.conf local_umask'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

GEN005040 - All FTP users must have a default umask of 077 - '/etc/xinetd.d/gssftp'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

GEN005140 - Any active TFTP daemon must be authorized and approved in the system accreditation package.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

GEN005760 - The Network File System (NFS) export configuration file must have mode 0644 or less permissive.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

GEN005810 - All Network File System (NFS) exported system files and system directories must be group-owned by root, bin, sys, or system.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

MD3X-00-000470 - MongoDB must prevent unauthorized and unintended information transfer via shared system resources.DISA STIG MongoDB Enterprise Advanced 3.x v2r3 OSUnix

SYSTEM AND COMMUNICATIONS PROTECTION

O121-C2-012500 - DBMS backup and restoration files must be protected from unauthorized access.DISA STIG Oracle 12c v3r1 DatabaseOracleDB

SYSTEM AND COMMUNICATIONS PROTECTION

O121-C2-018900 - The DBMS must prevent unauthorized and unintended information transfer via shared system resources.DISA STIG Oracle 12c v3r1 DatabaseOracleDB

SYSTEM AND COMMUNICATIONS PROTECTION

PGS9-00-011900 - Database contents must be protected from unauthorized and unintended information transfer by enforcement of a data-transfer policy.DISA STIG PostgreSQL 9.x on RHEL DB v2r5PostgreSQLDB

SYSTEM AND COMMUNICATIONS PROTECTION

SLES-12-010460 - The sticky bit must be set on all SUSE operating system world-writable directories.DISA SLES 12 STIG v2r13Unix

SYSTEM AND COMMUNICATIONS PROTECTION

SQL6-D0-009800 - SQL Server must prevent unauthorized and unintended information transfer via shared system resources.DISA STIG SQL Server 2016 Instance DB Audit v3r1MS_SQLDB

SYSTEM AND COMMUNICATIONS PROTECTION

UBTU-16-010420 - All world-writable directories must be group-owned by root, sys, bin, or an application group.DISA STIG Ubuntu 16.04 LTS v2r3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

WN12-CC-000059 - Solicited Remote Assistance must not be allowed.DISA Windows Server 2012 and 2012 R2 DC STIG v3r7Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN12-SO-000052 - Anonymous enumeration of shares must be restricted.DISA Windows Server 2012 and 2012 R2 DC STIG v3r7Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN12-SO-000055-DC - Named pipes that can be accessed anonymously must be configured with limited values on domain controllers.DISA Windows Server 2012 and 2012 R2 DC STIG v3r7Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN12-SO-000055-MS - Named pipes that can be accessed anonymously must be configured to contain no values on member servers.DISA Windows Server 2012 and 2012 R2 MS STIG v3r7Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN12-SO-000059 - Network shares that can be accessed anonymously must not be allowed.DISA Windows Server 2012 and 2012 R2 DC STIG v3r7Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN16-SO-000270 - Anonymous enumeration of shares must not be allowed.DISA Windows Server 2016 STIG v2r9Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN19-00-000230 - Windows Server 2019 non-system-created file shares must limit access to groups that require it.DISA Windows Server 2019 STIG v3r2Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN19-CC-000350 - Windows Server 2019 Remote Desktop Services must prevent drive redirection.DISA Windows Server 2019 STIG v3r2Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN19-SO-000230 - Windows Server 2019 must not allow anonymous enumeration of shares.DISA Windows Server 2019 STIG v3r2Windows

SYSTEM AND COMMUNICATIONS PROTECTION