Item Search

NameAudit NamePluginCategory
CD12-00-000100 - PostgreSQL must be configured to prohibit or restrict the use of organization-defined functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments.DISA STIG Crunchy Data PostgreSQL DB v3r1PostgreSQLDB

CONFIGURATION MANAGEMENT

CD12-00-001100 - PostgreSQL must associate organization-defined types of security labels having organization-defined security label values with information in transmission.DISA STIG Crunchy Data PostgreSQL OS v3r1Unix

ACCESS CONTROL

CD12-00-001800 - PostgreSQL must check the validity of all data inputs except those specifically identified by the organization.DISA STIG Crunchy Data PostgreSQL DB v3r1PostgreSQLDB

SYSTEM AND INFORMATION INTEGRITY

CD12-00-002400 - PostgreSQL must record time stamps, in audit records and application data that can be mapped to Coordinated Universal Time (UTC, formerly GMT).DISA STIG Crunchy Data PostgreSQL DB v3r1PostgreSQLDB

AUDIT AND ACCOUNTABILITY

CD12-00-002500 - PostgreSQL must reveal detailed error messages only to the ISSO, ISSM, SA, and DBA.DISA STIG Crunchy Data PostgreSQL OS v3r1Unix

SYSTEM AND INFORMATION INTEGRITY

CD12-00-002900 - PostgreSQL must by default shut down upon audit failure, to include the unavailability of space for more audit log records; or must be configurable to shut down upon audit failure.DISA STIG Crunchy Data PostgreSQL DB v3r1PostgreSQLDB

AUDIT AND ACCOUNTABILITY

CD12-00-005100 - PostgreSQL must generate audit records when successful logons or connections occur.DISA STIG Crunchy Data PostgreSQL DB v3r1PostgreSQLDB

AUDIT AND ACCOUNTABILITY

CD12-00-005800 - PostgreSQL must generate audit records for all privileged activities or other system-level access.DISA STIG Crunchy Data PostgreSQL DB v3r1PostgreSQLDB

AUDIT AND ACCOUNTABILITY

CD12-00-006100 - PostgreSQL must generate audit records when privileges/permissions are deleted.DISA STIG Crunchy Data PostgreSQL DB v3r1PostgreSQLDB

AUDIT AND ACCOUNTABILITY

CD12-00-006400 - PostgreSQL must generate audit records when privileges/permissions are modified.DISA STIG Crunchy Data PostgreSQL DB v3r1PostgreSQLDB

AUDIT AND ACCOUNTABILITY

CD12-00-006700 - PostgreSQL must generate audit records when categories of information (e.g., classification levels/security levels) is modified.DISA STIG Crunchy Data PostgreSQL DB v3r1PostgreSQLDB

AUDIT AND ACCOUNTABILITY

CD12-00-008500 - PostgreSQL must separate user functionality (including user interface services) from database management functionality.DISA STIG Crunchy Data PostgreSQL OS v3r1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

CD12-00-008900 - Unused database components, PostgreSQL software, and database objects must be removed.DISA STIG Crunchy Data PostgreSQL DB v3r1PostgreSQLDB

CONFIGURATION MANAGEMENT

CD12-00-011600 - PostgreSQL must automatically terminate a user session after organization-defined conditions or trigger events requiring session disconnect.DISA STIG Crunchy Data PostgreSQL DB v3r1PostgreSQLDB

ACCESS CONTROL

CD12-00-012000 - Access to database files must be limited to relevant processes and to authorized, administrative users.DISA STIG Crunchy Data PostgreSQL OS v3r1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

EPAS-00-001800 - The EDB Postgres Advanced Server must produce audit records containing sufficient information to establish where the events occurred.EnterpriseDB PostgreSQL Advanced Server DB v2r1PostgreSQLDB

AUDIT AND ACCOUNTABILITY

EPAS-00-002600 - The audit information produced by the EDB Postgres Advanced Server must be protected from unauthorized read access.EnterpriseDB PostgreSQL Advanced Server OS Linux v2r1Unix

AUDIT AND ACCOUNTABILITY

EPAS-00-002700 - The audit information produced by the EDB Postgres Advanced Server must be protected from unauthorized modification.EnterpriseDB PostgreSQL Advanced Server OS Linux v2r1Unix

AUDIT AND ACCOUNTABILITY

EPAS-00-004100 - The EDB Postgres Advanced Server must be configured to prohibit or restrict the use of organization-defined functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments.EnterpriseDB PostgreSQL Advanced Server DB v2r1PostgreSQLDB

CONFIGURATION MANAGEMENT

EPAS-00-005000 - The EDB Postgres Advanced Server must uniquely identify and authenticate nonorganizational users (or processes acting on behalf of nonorganizational users).EnterpriseDB PostgreSQL Advanced Server OS Linux v2r1Unix

IDENTIFICATION AND AUTHENTICATION

EPAS-00-006100 - Access to database files must be limited to relevant processes and to authorized, administrative users.EnterpriseDB PostgreSQL Advanced Server OS Linux v2r1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

EPAS-00-008200 - The EDB Postgres Advanced Server must record time stamps in audit records and application data that can be mapped to Coordinated Universal Time (UTC, formerly GMT).EnterpriseDB PostgreSQL Advanced Server DB v2r1PostgreSQLDB

AUDIT AND ACCOUNTABILITY

EPAS-00-010300 - Audit records must be generated when unsuccessful attempts to access categorized information (e.g., classification levels/security levels) occur.EnterpriseDB PostgreSQL Advanced Server DB v2r1PostgreSQLDB

AUDIT AND ACCOUNTABILITY

EPAS-00-012200 - The EDB Postgres Advanced Server must generate audit records showing starting and ending time for user access to the database(s).EnterpriseDB PostgreSQL Advanced Server DB v2r1PostgreSQLDB

AUDIT AND ACCOUNTABILITY

EPAS-00-012900 - The EDB Postgres Advanced Server must implement NIST FIPS 140-2 or 140-3 validated cryptographic modules to protect unclassified information requiring confidentiality and cryptographic protection, in accordance with the requirements of the data owner.EnterpriseDB PostgreSQL Advanced Server OS Linux v2r1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

ESXI-67-000009 - The ESXi host SSH daemon must be configured with the DoD logon banner - DoD login banner.DISA STIG VMware vSphere 6.7 ESXi OS v1r3Unix

ACCESS CONTROL

FGFW-ND-000075 - The FortiGate device must generate audit records when successful/unsuccessful logon attempts occurDISA Fortigate Firewall NDM STIG v1r4FortiGate

AUDIT AND ACCOUNTABILITY

FGFW-ND-000080 - The FortiGate device must generate audit records for privileged activities or other system-level accessDISA Fortigate Firewall NDM STIG v1r4FortiGate

AUDIT AND ACCOUNTABILITY

FGFW-ND-000095 - The FortiGate device must generate audit records containing information that establishes the identity of any individual or process associated with the event.DISA Fortigate Firewall NDM STIG v1r4FortiGate

AUDIT AND ACCOUNTABILITY

FGFW-ND-000270 - The FortiGate device must terminate idle sessions after 10 minutes of inactivity.DISA Fortigate Firewall NDM STIG v1r4FortiGate

MAINTENANCE

FNFG-FW-000065 - The FortiGate firewall must disable or remove unnecessary network services and functions that are not used as part of its role in the architecture.DISA Fortigate Firewall STIG v1r3FortiGate

CONFIGURATION MANAGEMENT

FNFG-FW-000090 - The FortiGate firewall must fail to a secure state if the firewall filtering functions fail unexpectedly - fail-openDISA Fortigate Firewall STIG v1r3FortiGate

SYSTEM AND COMMUNICATIONS PROTECTION

FNFG-FW-000145 - The FortiGate firewall must be configured to restrict it from accepting outbound packets that contain an illegitimate address in the source address field via an egress filter or by enabling Unicast Reverse Path Forwarding (uRPF).DISA Fortigate Firewall STIG v1r3FortiGate

CONFIGURATION MANAGEMENT

VCEM-67-000002 - ESX Agent Manager must limit the number of concurrent connections permitted.DISA STIG VMware vSphere 6.7 EAM Tomcat v1r4Unix

ACCESS CONTROL

VCEM-67-000016 - ESX Agent Manager must not have any symbolic links in the web content directory tree.DISA STIG VMware vSphere 6.7 EAM Tomcat v1r4Unix

CONFIGURATION MANAGEMENT

VCEM-67-000021 - ESX Agent Manager must use the 'setCharacterEncodingFilter' filter - filterDISA STIG VMware vSphere 6.7 EAM Tomcat v1r4Unix

SYSTEM AND INFORMATION INTEGRITY

VCEM-67-000022 - ESX Agent Manager must set the welcome-file node to a default web page.DISA STIG VMware vSphere 6.7 EAM Tomcat v1r4Unix

SYSTEM AND INFORMATION INTEGRITY

VCLD-80-000033 The vCenter VAMI service must have resource mappings set to disable the serving of certain file types.DISA VMware vSphere 8.0 vCenter Appliance Management Interface (VAMI) STIG v2r1Unix

CONFIGURATION MANAGEMENT

VCLD-80-000064 The vCenter VAMI service must have debug logging disabled.DISA VMware vSphere 8.0 vCenter Appliance Management Interface (VAMI) STIG v2r1Unix

SYSTEM AND INFORMATION INTEGRITY

VCPF-80-000143 The vCenter Perfcharts service default documentation must be removed.DISA VMware vSphere 8.0 vCenter Appliance Perfcharts STIG v2r1Unix

CONFIGURATION MANAGEMENT

VCST-80-000005 The vCenter STS service cookies must have secure flag set.DISA VMware vSphere 8.0 vCenter Appliance Secure Token Service (STS) STIG v2r1Unix

ACCESS CONTROL

VCST-80-000067 The vCenter STS service 'ErrorReportValve showServerInfo' must be set to 'false'.DISA VMware vSphere 8.0 vCenter Appliance Secure Token Service (STS) STIG v2r1Unix

SYSTEM AND INFORMATION INTEGRITY

VCST-80-000134 The vCenter STS service shutdown port must be disabled.DISA VMware vSphere 8.0 vCenter Appliance Secure Token Service (STS) STIG v2r1Unix

CONFIGURATION MANAGEMENT

VCST-80-000136 The vCenter STS service debug parameter must be disabled.DISA VMware vSphere 8.0 vCenter Appliance Secure Token Service (STS) STIG v2r1Unix

CONFIGURATION MANAGEMENT

VCUI-80-000126 The vCenter UI service must limit the number of times that each Transmission Control Protocol (TCP) connection is kept alive.DISA VMware vSphere 8.0 vCenter Appliance User Interface (UI) STIG v2r1Unix

ACCESS CONTROL

VCUI-80-000129 The vCenter UI service cookies must have 'http-only' flag set.DISA VMware vSphere 8.0 vCenter Appliance User Interface (UI) STIG v2r1Unix

ACCESS CONTROL

VCUI-80-000143 The vCenter UI service default documentation must be removed.DISA VMware vSphere 8.0 vCenter Appliance User Interface (UI) STIG v2r1Unix

CONFIGURATION MANAGEMENT

VCUI-80-000154 The vCenter UI service manager webapp must be removed.DISA VMware vSphere 8.0 vCenter Appliance User Interface (UI) STIG v2r1Unix

CONFIGURATION MANAGEMENT

VCUI-80-000155 The vCenter UI service host-manager webapp must be removed.DISA VMware vSphere 8.0 vCenter Appliance User Interface (UI) STIG v2r1Unix

CONFIGURATION MANAGEMENT

VMCH-80-000207 Virtual machines (VMs) must enable logging.DISA VMware vSphere 8.0 Virtual Machine STIG v2r1VMware

CONFIGURATION MANAGEMENT