GEN001220 - All system files, programs, and directories must be owned by a system account - '/bin/*' | DISA STIG AIX 6.1 v1r14 | Unix | CONFIGURATION MANAGEMENT |
GEN001220 - All system files, programs, and directories must be owned by a system account - '/etc/*' | DISA STIG AIX 6.1 v1r14 | Unix | CONFIGURATION MANAGEMENT |
GEN001240 - System files, programs, and directories must be group-owned by a system group - '/usr/lbin/*' | DISA STIG AIX 6.1 v1r14 | Unix | CONFIGURATION MANAGEMENT |
GEN001240 - System files, programs, and directories must be group-owned by a system group - '/usr/ucb/*' | DISA STIG AIX 6.1 v1r14 | Unix | CONFIGURATION MANAGEMENT |
GEN001290 - All manual page files must not have extended ACLs - '/usr/share/info/*' | DISA STIG AIX 6.1 v1r14 | Unix | ACCESS CONTROL |
GEN001361 - NIS/NIS+/yp command files must not have extended ACLs - '/var/nis' | DISA STIG AIX 6.1 v1r14 | Unix | ACCESS CONTROL |
GEN001430 - The /etc/security/passwd file must not have an extended ACL. | DISA STIG AIX 6.1 v1r14 | Unix | ACCESS CONTROL |
GEN001490 - User home directories must not have extended ACLs. | DISA STIG AIX 6.1 v1r14 | Unix | ACCESS CONTROL |
GEN001560 - All files and directories contained in user's home directories must have mode 0750 or less permissive. | DISA STIG AIX 6.1 v1r14 | Unix | ACCESS CONTROL |
GEN001720 - All global initialization files must have mode 0644 or less permissive - '/etc/environment' | DISA STIG AIX 6.1 v1r14 | Unix | ACCESS CONTROL |
GEN001730 - All global initialization files must not have extended ACLs - '/etc/csh.cshrc' | DISA STIG AIX 6.1 v1r14 | Unix | ACCESS CONTROL |
GEN001730 - All global initialization files must not have extended ACLs - '/etc/csh.login' | DISA STIG AIX 6.1 v1r14 | Unix | ACCESS CONTROL |
GEN001730 - All global initialization files must not have extended ACLs - '/etc/profile' | DISA STIG AIX 6.1 v1r14 | Unix | ACCESS CONTROL |
GEN001780 - Global initialization files must contain the mesg -n or mesg n commands. | DISA STIG AIX 6.1 v1r14 | Unix | CONFIGURATION MANAGEMENT |
GEN001800 - All skeleton files (typically those in /etc/skel) must have mode 0644 or less permissive - '/etc/security/.profile' | DISA STIG AIX 6.1 v1r14 | Unix | ACCESS CONTROL |
GEN001810 - Skeleton files must not have extended ACLs - '/etc/security/.profile' | DISA STIG AIX 6.1 v1r14 | Unix | ACCESS CONTROL |
GEN001870 - Local initialization files must be group-owned by the user's primary group or root - '~/.cshrc' | DISA STIG AIX 6.1 v1r14 | Unix | ACCESS CONTROL |
GEN001870 - Local initialization files must be group-owned by the user's primary group or root - '~/.emacs' | DISA STIG AIX 6.1 v1r14 | Unix | ACCESS CONTROL |
GEN001870 - Local initialization files must be group-owned by the user's primary group or root - '~/.login' | DISA STIG AIX 6.1 v1r14 | Unix | ACCESS CONTROL |
GEN001870 - Local initialization files must be group-owned by the user's primary group or root - '~/.logout' | DISA STIG AIX 6.1 v1r14 | Unix | ACCESS CONTROL |
GEN001890 - Local initialization files must not have extended ACLs - '.exrc' | DISA STIG AIX 6.1 v1r14 | Unix | ACCESS CONTROL |
GEN001890 - Local initialization files must not have extended ACLs - '.logout' | DISA STIG AIX 6.1 v1r14 | Unix | ACCESS CONTROL |
GEN001980 - /etc/security/passwd file must not contain a plus (+) without defining entries for NIS+ netgroups or LDAP-'/etc/security/passwd' | DISA STIG AIX 6.1 v1r14 | Unix | CONFIGURATION MANAGEMENT |
GEN002000 - There must be no .netrc files on the system. | DISA STIG AIX 6.1 v1r14 | Unix | IDENTIFICATION AND AUTHENTICATION |
GEN002040 - There must be no .rhosts, .shosts, hosts.equiv, or shosts.equiv files on the system - 'hosts.equiv' | DISA STIG AIX 6.1 v1r14 | Unix | CONFIGURATION MANAGEMENT |
GEN002060 - All .rhosts, .shosts, .netrc, or hosts.equiv files must be accessible by only root or the owner - '~/shosts.equiv' - user | DISA STIG AIX 6.1 v1r14 | Unix | ACCESS CONTROL |
GEN002220 - All shell files must have mode 0755 or less permissive. | DISA STIG AIX 6.1 v1r14 | Unix | ACCESS CONTROL |
GEN002660 - Auditing must be implemented. | DISA STIG AIX 6.1 v1r14 | Unix | AUDIT AND ACCOUNTABILITY |
GEN002715 - System audit tool executables must be owned by root - '/usr/sbin/auditbin' | DISA STIG AIX 6.1 v1r14 | Unix | AUDIT AND ACCOUNTABILITY |
GEN002715 - System audit tool executables must be owned by root - '/usr/sbin/auditconv' | DISA STIG AIX 6.1 v1r14 | Unix | AUDIT AND ACCOUNTABILITY |
GEN002715 - System audit tool executables must be owned by root - '/usr/sbin/auditselect' | DISA STIG AIX 6.1 v1r14 | Unix | AUDIT AND ACCOUNTABILITY |
GEN002718 - System audit tool executables must not have extended ACLs - '/usr/sbin/auditselect' | DISA STIG AIX 6.1 v1r14 | Unix | AUDIT AND ACCOUNTABILITY |
SLES-15-010490 - If Network Security Services (NSS) is being used by the SUSE operating system it must prohibit the use of cached authentications after one day. | DISA SLES 15 STIG v2r2 | Unix | IDENTIFICATION AND AUTHENTICATION |
SLES-15-030670 - The audit-audispd-plugins must be installed on the SUSE operating system. | DISA SLES 15 STIG v2r2 | Unix | AUDIT AND ACCOUNTABILITY |
SLES-15-040110 - All SUSE operating system local initialization files must have mode 0740 or less permissive. | DISA SLES 15 STIG v2r2 | Unix | CONFIGURATION MANAGEMENT |
SLES-15-040230 - The SUSE operating system SSH daemon must be configured to not allow authentication using known hosts authentication. | DISA SLES 15 STIG v2r2 | Unix | CONFIGURATION MANAGEMENT |
WN10-00-000115 - The Telnet Client must not be installed on the system. | DISA Windows 10 STIG v3r2 | Windows | CONFIGURATION MANAGEMENT |
WN10-00-000135 - A host-based firewall must be installed and enabled on the system. | DISA Windows 10 STIG v3r2 | Windows | CONFIGURATION MANAGEMENT |
WN10-CC-000005 - Camera access from the lock screen must be disabled. | DISA Windows 10 STIG v3r2 | Windows | CONFIGURATION MANAGEMENT |
WN10-CC-000010 - The display of slide shows on the lock screen must be disabled. | DISA Windows 10 STIG v3r2 | Windows | CONFIGURATION MANAGEMENT |
WN10-CC-000040 - Insecure logons to an SMB server must be disabled. | DISA Windows 10 STIG v3r2 | Windows | CONFIGURATION MANAGEMENT |
WN10-CC-000060 - Connections to non-domain networks when connected to a domain authenticated network must be blocked. | DISA Windows 10 STIG v3r2 | Windows | CONFIGURATION MANAGEMENT |
WN10-CC-000120 - The network selection user interface (UI) must not be displayed on the logon screen. | DISA Windows 10 STIG v3r2 | Windows | CONFIGURATION MANAGEMENT |
WN10-CC-000145 - Users must be prompted for a password on resume from sleep (on battery). | DISA Windows 10 STIG v3r2 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
WN10-CC-000155 - Solicited Remote Assistance must not be allowed. | DISA Windows 10 STIG v3r2 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
WN10-CC-000165 - Unauthenticated RPC clients must be restricted from connecting to the RPC server. | DISA Windows 10 STIG v3r2 | Windows | IDENTIFICATION AND AUTHENTICATION |
WN10-CC-000270 - Passwords must not be saved in the Remote Desktop Client. | DISA Windows 10 STIG v3r2 | Windows | IDENTIFICATION AND AUTHENTICATION |
WN10-CC-000390 - Windows 10 should be configured to prevent users from receiving suggestions for third-party or additional applications. | DISA Windows 10 STIG v3r2 | Windows | CONFIGURATION MANAGEMENT |
WN10-SO-000060 - The system must be configured to require a strong session key. | DISA Windows 10 STIG v3r2 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
WN10-SO-000095 - The Smart Card removal option must be configured to Force Logoff or Lock Workstation. | DISA Windows 10 STIG v3r2 | Windows | CONFIGURATION MANAGEMENT |