Item Search

NameAudit NamePluginCategory
CD12-00-008000 - PostgreSQL must implement NIST FIPS 140-2 or 140-3 validated cryptographic modules to generate and validate cryptographic hashes.DISA STIG Crunchy Data PostgreSQL OS v3r1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

CD12-00-008200 - PostgreSQL must implement NIST FIPS 140-2 or 140-3 validated cryptographic modules to protect unclassified information requiring confidentiality and cryptographic protection, in accordance with the data owner's requirements.DISA STIG Crunchy Data PostgreSQL OS v3r1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

CNTR-K8-002001 - Kubernetes must enable PodSecurity admission controller on static pods and Kubelets.DISA STIG Kubernetes v2r3Unix

ACCESS CONTROL

CNTR-K8-002010 - Kubernetes must have a pod security policy set.DISA STIG Kubernetes v2r3Unix

ACCESS CONTROL

EPAS-00-004800 - When using command-line tools such as psql, users must use a logon method that does not expose the password.EnterpriseDB PostgreSQL Advanced Server DB v2r1PostgreSQLDB

IDENTIFICATION AND AUTHENTICATION

EPAS-00-004810 - Applications must obscure feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals.EnterpriseDB PostgreSQL Advanced Server DB v2r1PostgreSQLDB

IDENTIFICATION AND AUTHENTICATION

FGFW-ND-000295 - The FortiGate device must be configured to send log data to a central log server for the purpose of forwarding alerts to the administrators and the ISSO.DISA Fortigate Firewall NDM STIG v1r4FortiGate

SYSTEM AND INFORMATION INTEGRITY

GEN001100 - Root passwords must never be passed over a network in clear text form - 'root has logged in over a network'DISA STIG AIX 5.3 v1r2Unix

IDENTIFICATION AND AUTHENTICATION

GEN003850 - The telnet daemon must not be running.DISA STIG AIX 5.3 v1r2Unix

IDENTIFICATION AND AUTHENTICATION

GOOG-09-999999 - All Google Android 9 installations must be removed.AirWatch - DISA Google Android 9.x v2r1MDM

CONFIGURATION MANAGEMENT

GOOG-11-010800 - Google Android 11 devices must have the latest available Google Android 11 operating system installed.MobileIron - DISA Google Android 11 COPE v2r1MDM

CONFIGURATION MANAGEMENT

GOOG-011-999999 - All Google Android 11 installations must be removed.AirWatch - DISA Google Android 11 COBO v2r1MDM

CONFIGURATION MANAGEMENT

GOOG-011-999999 - All Google Android 11 installations must be removed.MobileIron - DISA Google Android 11 COPE v2r1MDM

CONFIGURATION MANAGEMENT

GOOG-12-010800 - Android 12 devices must have the latest available Google Android 12 operating system installed.MobileIron - DISA Google Android 12 COBO v1r2MDM

CONFIGURATION MANAGEMENT

HONW-09-008400 - On all Honeywell Mobility Edge Android Pie devices, cryptography must be configured to be in FIPS 140-2 validated mode.AirWatch - DISA Honeywell Android 9.x COPE v1r2MDM

CONFIGURATION MANAGEMENT

HONW-09-010900 - Honeywell Mobility Edge Android Pie devices must have a NIAP validated Honeywell Mobility Edge Android Pie devices operating system installed.MobileIron - DISA Honeywell Android 9.x COPE v1r2MDM

CONFIGURATION MANAGEMENT

HONW-09-999999 - All Honeywell Android 9 installations must be removed.AirWatch - DISA Honeywell Android 9.x COPE v1r2MDM

CONFIGURATION MANAGEMENT

JUEX-NM-000340 - The Juniper EX switch must be configured to use FIPS 140-2/140-3 validated algorithms for authentication to a cryptographic module.DISA Juniper EX Series Network Device Management v2r3Juniper

IDENTIFICATION AND AUTHENTICATION

JUEX-NM-000370 - The Juniper device must be configured to only allow authorized administrators to view or change the device configuration, system files, and other files stored either in the device or on removable media (such as a flash drive).DISA Juniper EX Series Network Device Management v2r3Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

MD4X-00-003800 - MongoDB must protect the confidentiality and integrity of all information at rest.DISA STIG MongoDB Enterprise Advanced 4.x v1r4 OSUnix

SYSTEM AND COMMUNICATIONS PROTECTION

MOTO-09-999999 - All Motorola Android 9 installations must be removed.AirWatch - DISA Motorola Android Pie.x COBO v1r2MDM

CONFIGURATION MANAGEMENT

MOTO-09-999999 - All Motorola Android 9 installations must be removed.MobileIron - DISA Motorola Android Pie.x COBO v1r2MDM

CONFIGURATION MANAGEMENT

MSFT-11-010800 - Microsoft Android 11 devices must have the latest available Microsoft Android 11 operating system installed.AirWatch - DISA Microsoft Android 11 COBO v1r2MDM

CONFIGURATION MANAGEMENT

OL08-00-010121 - The OL 8 operating system must not have accounts configured with blank or null passwords.DISA Oracle Linux 8 STIG v2r4Unix

CONFIGURATION MANAGEMENT

OL08-00-010140 - OL 8 operating systems booted with United Extensible Firmware Interface (UEFI) must require authentication upon booting into single-user mode and maintenance.DISA Oracle Linux 8 STIG v2r4Unix

ACCESS CONTROL

OL08-00-010150 - OL 8 operating systems booted with a BIOS must require authentication upon booting into single-user and maintenance modes.DISA Oracle Linux 8 STIG v2r4Unix

ACCESS CONTROL

OL08-00-040171 - The x86 Ctrl-Alt-Delete key sequence in OL 8 must be disabled if a graphical user interface is installed.DISA Oracle Linux 8 STIG v2r4Unix

CONFIGURATION MANAGEMENT

OL08-00-040200 - The root account must be the only account having unrestricted access to the OL 8 system.DISA Oracle Linux 8 STIG v2r4Unix

CONFIGURATION MANAGEMENT

PHTN-67-000999 - The version of the Photon OS running on the server must be a supported version.DISA STIG VMware vSphere 6.7 Photon OS v1r6Unix

CONFIGURATION MANAGEMENT

RHEL-07-010291 - The Red Hat Enterprise Linux operating system must not have accounts configured with blank or null passwords.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

CONFIGURATION MANAGEMENT

RHEL-08-010000 - RHEL 8 must be a vendor-supported release.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-010150 - RHEL 8 operating systems booted with a BIOS must require authentication upon booting into single-user and maintenance modes.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

ACCESS CONTROL

RHEL-08-040171 - The x86 Ctrl-Alt-Delete key sequence in RHEL 8 must be disabled if a graphical user interface is installed.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

SLES-15-010200 - SUSE operating systems with Unified Extensible Firmware Interface (UEFI) implemented must require authentication upon booting into single-user mode and maintenance.DISA SUSE Linux Enterprise Server 15 STIG v2r4Unix

ACCESS CONTROL

SLES-15-040062 - The SUSE operating system must disable the systemd Ctrl-Alt-Delete burst key sequence.DISA SUSE Linux Enterprise Server 15 STIG v2r4Unix

CONFIGURATION MANAGEMENT

SLES-15-040430 - The SUSE operating system must not allow unattended or automatic logon via the graphical user interface (GUI).DISA SUSE Linux Enterprise Server 15 STIG v2r4Unix

CONFIGURATION MANAGEMENT

SPLK-CL-000320 - Splunk Enterprise must use organization-level authentication to uniquely identify and authenticate users.DISA STIG Splunk Enterprise 8.x for Linux v2r2 STIG REST APISplunk

IDENTIFICATION AND AUTHENTICATION

SQL2-00-016500 - SQL Server must have the SQL Server Data Tools (SSDT) software component removed from SQL Server if SSDT is unused.DISA STIG SQL Server 2012 Database OS Audit v1r20Windows

CONFIGURATION MANAGEMENT

SYMP-AG-000300 - Symantec ProxySG must be configured to prohibit or restrict the use of network services as defined in the PPSM CAL and vulnerability assessments. - DestinationDISA Symantec ProxySG Benchmark ALG v1r3BlueCoat

CONFIGURATION MANAGEMENT

SYMP-AG-000300 - Symantec ProxySG must be configured to prohibit or restrict the use of network services as defined in the PPSM CAL and vulnerability assessments. - SourceDISA Symantec ProxySG Benchmark ALG v1r3BlueCoat

CONFIGURATION MANAGEMENT

SYMP-AG-000320 - Symantec ProxySG must uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users) - Domain JoinedDISA Symantec ProxySG Benchmark ALG v1r3BlueCoat

IDENTIFICATION AND AUTHENTICATION

SYMP-AG-000340 - Symantec ProxySG providing user authentication intermediary services must restrict user authentication traffic to specific authentication servers - Domain joinedDISA Symantec ProxySG Benchmark ALG v1r3BlueCoat

IDENTIFICATION AND AUTHENTICATION

SYMP-NM-000220 - Symantec ProxySG must use only approved management services protocols.DISA Symantec ProxySG Benchmark NDM v1r2BlueCoat

CONFIGURATION MANAGEMENT

VCFL-67-000999 - The version of Virgo-Client running on the system must be a supported version.DISA STIG VMware vSphere 6.7 Virgo Client v1r2Unix

SYSTEM AND INFORMATION INTEGRITY

VCLD-67-000034 - VAMI must implement TLS1.2 exclusively - sslv3DISA STIG VMware vSphere 6.7 VAMI-lighttpd v1r3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

VCLD-67-000034 - VAMI must implement TLS1.2 exclusively - tlsv10DISA STIG VMware vSphere 6.7 VAMI-lighttpd v1r3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

VMCH-67-000999 - The version of VMM running on the server must be a supported version.DISA STIG VMware vSphere 6.7 Virtual Machine v1r3VMware

CONFIGURATION MANAGEMENT

WN22-00-000130 - Windows Server 2022 local volumes must use a format that supports NTFS attributes.DISA Microsoft Windows Server 2022 STIG v2r4Windows

ACCESS CONTROL

WN22-SO-000230 - Windows Server 2022 must not allow anonymous enumeration of shares.DISA Microsoft Windows Server 2022 STIG v2r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN22-SO-000250 - Windows Server 2022 must restrict anonymous access to Named Pipes and Shares.DISA Microsoft Windows Server 2022 STIG v2r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION