Item Search

NameAudit NamePluginCategory
AIX7-00-002144 - The AIX /etc/syslog.conf file must be owned by root.DISA STIG AIX 7.x v3r1Unix

CONFIGURATION MANAGEMENT

AIX7-00-002148 - The AIX /var/spool/cron/atjobs directory must be group-owned by cron.DISA STIG AIX 7.x v3r1Unix

CONFIGURATION MANAGEMENT

APPL-11-001010 - The macOS system must shut down by default upon audit failure (unless availability is an overriding concern).DISA STIG Apple macOS 11 v1r8Unix

AUDIT AND ACCOUNTABILITY

APPL-11-001012 - The macOS system must be configured with audit log files owned by root.DISA STIG Apple macOS 11 v1r8Unix

AUDIT AND ACCOUNTABILITY

APPL-11-002006 - The macOS system must be configured to disable the UUCP service.DISA STIG Apple macOS 11 v1r8Unix

CONFIGURATION MANAGEMENT

APPL-11-002022 - The macOS system must be configured to disable Remote Apple Events.DISA STIG Apple macOS 11 v1r8Unix

CONFIGURATION MANAGEMENT

APPL-11-002060 - The macOS system must allow only applications that have a valid digital signature to run - AllowIdentifiedDevelopersDISA STIG Apple macOS 11 v1r8Unix

CONFIGURATION MANAGEMENT

APPL-11-002060 - The macOS system must allow only applications that have a valid digital signature to run - EnableAssessmentDISA STIG Apple macOS 11 v1r8Unix

CONFIGURATION MANAGEMENT

APPL-11-002060 - The macOS system must allow only applications that have a valid digital signature to run - Unsigned ApplicationsDISA STIG Apple macOS 11 v1r8Unix

CONFIGURATION MANAGEMENT

APPL-11-002068 - The macOS system must set permissions on user home directories to prevent users from having access to read or modify another user's files - Access Control ListDISA STIG Apple macOS 11 v1r8Unix

CONFIGURATION MANAGEMENT

APPL-11-002068 - The macOS system must set permissions on user home directories to prevent users from having access to read or modify another user's files - User directory permissionsDISA STIG Apple macOS 11 v1r8Unix

CONFIGURATION MANAGEMENT

APPL-11-002068 - The macOS system must set permissions on user home directories to prevent users from having access to read or modify another user's files - User subdirectory permissionsDISA STIG Apple macOS 11 v1r8Unix

CONFIGURATION MANAGEMENT

APPL-11-002068 - The macOS system must set permissions on user home directories to prevent users from having access to read or modify another user's files - User subdirectory Public permissionsDISA STIG Apple macOS 11 v1r8Unix

CONFIGURATION MANAGEMENT

APPL-11-003052 - The macOS system must be configured so that the sudo command requires smart card authentication.DISA STIG Apple macOS 11 v1r8Unix

CONFIGURATION MANAGEMENT

APPL-11-005050 - The macOS Application Firewall must be enabled - EnableStealthModeDISA STIG Apple macOS 11 v1r8Unix

CONFIGURATION MANAGEMENT

CNTR-K8-000300 - The Kubernetes Scheduler must have secure binding.DISA STIG Kubernetes v2r2Unix

ACCESS CONTROL

CNTR-K8-000350 - The Kubernetes API server must have the secure port set.DISA STIG Kubernetes v2r2Unix

ACCESS CONTROL

CNTR-K8-000410 - Kubernetes Worker Nodes must not have the sshd service enabled.DISA STIG Kubernetes v2r2Unix

ACCESS CONTROL

CNTR-K8-000420 - Kubernetes dashboard must not be enabled.DISA STIG Kubernetes v2r2Unix

ACCESS CONTROL

CNTR-K8-000430 - Kubernetes Kubectl cp command must give expected access and results.DISA STIG Kubernetes v2r2Unix

ACCESS CONTROL

CNTR-K8-000910 - Kubernetes Controller Manager must disable profiling.DISA STIG Kubernetes v2r2Unix

CONFIGURATION MANAGEMENT

CNTR-K8-001300 - Kubernetes Kubelet must not disable timeouts.DISA STIG Kubernetes v2r2Unix

SYSTEM AND COMMUNICATIONS PROTECTION

CNTR-K8-001510 - Kubernetes etcd must have the SSL Certificate Authority set.DISA STIG Kubernetes v2r2Unix

SYSTEM AND COMMUNICATIONS PROTECTION

CNTR-K8-003110 - The Kubernetes component manifests must be owned by root.DISA STIG Kubernetes v2r2Unix

CONFIGURATION MANAGEMENT

CNTR-K8-003120 - The Kubernetes component etcd must be owned by etcd.DISA STIG Kubernetes v2r2Unix

CONFIGURATION MANAGEMENT

CNTR-K8-003170 - The Kubernetes Kubelet certificate authority must be owned by root.DISA STIG Kubernetes v2r2Unix

CONFIGURATION MANAGEMENT

CNTR-K8-003200 - The Kubernetes kubelet KubeConfig file must be owned by root.DISA STIG Kubernetes v2r2Unix

CONFIGURATION MANAGEMENT

CNTR-K8-003260 - The Kubernetes etcd must have file permissions set to 644 or more restrictive.DISA STIG Kubernetes v2r2Unix

CONFIGURATION MANAGEMENT

Configuring an automatic logout for idle sessions - Configuration utilityTenable F5 BIG-IP Best Practice AuditF5

ACCESS CONTROL

Configuring CIDR Network Addresses for the BIG-IP packet filter - Filter established connectionsTenable F5 BIG-IP Best Practice AuditF5

ACCESS CONTROL

Configuring CIDR Network Addresses for the BIG-IP packet filter - Packet filter loggingTenable F5 BIG-IP Best Practice AuditF5

ACCESS CONTROL

Configuring the BIG-IP system to enforce the use of strict passwordsTenable F5 BIG-IP Best Practice AuditF5

ACCESS CONTROL

MYS8-00-000200 - MySQL Database Server 8.0 must limit the number of concurrent sessions to an organization-defined number per user for all accounts and/or account types.DISA Oracle MySQL 8.0 v2r2 DBMySQLDB

ACCESS CONTROL

MYS8-00-001300 - The audit information produced by the MySQL Database Server 8.0 must be protected from unauthorized modification.DISA Oracle MySQL 8.0 v2r2 OS LinuxUnix

AUDIT AND ACCOUNTABILITY

MYS8-00-001800 - The MySQL Database Server 8.0 must be able to generate audit records when privileges/permissions are retrieved.DISA Oracle MySQL 8.0 v2r2 OS LinuxUnix

AUDIT AND ACCOUNTABILITY

MYS8-00-002100 - The MySQL Database Server 8.0 must generate audit records when unsuccessful attempts to access security objects occur.DISA Oracle MySQL 8.0 v2r2 DBMySQLDB

AUDIT AND ACCOUNTABILITY

MYS8-00-002300 - The MySQL Database Server 8.0 must generate audit records when unsuccessful attempts to access categories of information (e.g., classification levels/security levels) occur.DISA Oracle MySQL 8.0 v2r2 OS LinuxUnix

AUDIT AND ACCOUNTABILITY

MYS8-00-003100 - The MySQL Database Server 8.0 must generate audit records when unsuccessful attempts to modify categories of information (e.g., classification levels/security levels) occur.DISA Oracle MySQL 8.0 v2r2 DBMySQLDB

AUDIT AND ACCOUNTABILITY

MYS8-00-003200 - The MySQL Database Server 8.0 must generate audit records when privileges/permissions are deleted.DISA Oracle MySQL 8.0 v2r2 DBMySQLDB

AUDIT AND ACCOUNTABILITY

MYS8-00-004100 - The MySQL Database Server 8.0 must generate audit records when unsuccessful attempts to execute privileged activities or other system-level access occur.DISA Oracle MySQL 8.0 v2r2 DBMySQLDB

AUDIT AND ACCOUNTABILITY

MYS8-00-007400 - The MySQL Database Server 8.0 and associated applications must reserve the use of dynamic code execution for situations that require it.DISA Oracle MySQL 8.0 v2r2 DBMySQLDB

SYSTEM AND INFORMATION INTEGRITY

Overview of Appliance modeTenable F5 BIG-IP Best Practice AuditF5

ACCESS CONTROL

SLES-15-010550 - Address space layout randomization (ASLR) must be implemented by the SUSE operating system to protect memory from unauthorized code execution.DISA SLES 15 STIG v2r2Unix

SYSTEM AND INFORMATION INTEGRITY

SLES-15-020090 - The SUSE operating system must not have unnecessary accounts.DISA SLES 15 STIG v2r2Unix

CONFIGURATION MANAGEMENT

SLES-15-020091 - The SUSE operating system must not have unnecessary account capabilities.DISA SLES 15 STIG v2r2Unix

CONFIGURATION MANAGEMENT

SLES-15-020101 - The SUSE operating system must restrict privilege elevation to authorized personnel.DISA SLES 15 STIG v2r2Unix

CONFIGURATION MANAGEMENT

SLES-15-030580 - The Information System Security Officer (ISSO) and System Administrator (SA), at a minimum, must have mail aliases to be notified of a SUSE operating system audit processing failure.DISA SLES 15 STIG v2r2Unix

AUDIT AND ACCOUNTABILITY

SLES-15-030740 - The SUSE operating system must generate audit records for all uses of the unlink, unlinkat, rename, renameat, and rmdir system calls.DISA SLES 15 STIG v2r2Unix

AUDIT AND ACCOUNTABILITY

SLES-15-030760 - The SUSE operating system must generate audit records for the /run/utmp file.DISA SLES 15 STIG v2r2Unix

AUDIT AND ACCOUNTABILITY

SLES-15-040070 - All SUSE operating system local interactive users must have a home directory assigned in the /etc/passwd file.DISA SLES 15 STIG v2r2Unix

CONFIGURATION MANAGEMENT