Item Search

NameAudit NamePluginCategory
MOTO-09-000400 - The Motorola Android Pie must be configured to lock the display after 15 minutes (or less) of inactivity - or less of inactivity.AirWatch - DISA Motorola Android Pie.x COPE v1r2MDM

ACCESS CONTROL

MOTO-09-002800 - The Motorola Android Pie must be configured to disable developer modes.MobileIron - DISA Motorola Android Pie.x COBO v1r2MDM

CONFIGURATION MANAGEMENT

MOTO-09-002800 - The Motorola Android Pie must be configured to disable developer modes.MobileIron - DISA Motorola Android Pie.x COPE v1r2MDM

CONFIGURATION MANAGEMENT

MOTO-09-003500 - The Motorola Android Pie must be configured to disable USB mass storage mode.MobileIron - DISA Motorola Android Pie.x COBO v1r2MDM

CONFIGURATION MANAGEMENT

MOTO-09-008700 - Motorola Android Pie users must complete required training.MobileIron - DISA Motorola Android Pie.x COPE v1r2MDM

CONFIGURATION MANAGEMENT

MOTO-09-009400 - Motorola Android Pie work profile must be configured to enforce the system application disable list.MobileIron - DISA Motorola Android Pie.x COPE v1r2MDM

CONFIGURATION MANAGEMENT

MOTO-09-009600 - Motorola Android Pie must be provisioned as a fully managed device and configured to create a work profile.AirWatch - DISA Motorola Android Pie.x COPE v1r2MDM

CONFIGURATION MANAGEMENT

MOTO-09-010200 - Motorola Android Pie must be configured to disallow configuration of date and time.MobileIron - DISA Motorola Android Pie.x COBO v1r2MDM

CONFIGURATION MANAGEMENT

MOTO-09-010200 - Motorola Android Pie must be configured to disallow configuration of date and time.AirWatch - DISA Motorola Android Pie.x COPE v1r2MDM

CONFIGURATION MANAGEMENT

MOTS-11-000200 - Motorola Solutions Android 11 must be configured to not allow passwords that include more than two repeating or sequential characters - NumbersAirWatch - DISA Motorola Solutions Android 11 COBO v1r3MDM

CONFIGURATION MANAGEMENT

MOTS-11-000300 - Motorola Solutions Android 11 must be configured to enable a screen-lock policy that will lock the display after a period of inactivity.AirWatch - DISA Motorola Solutions Android 11 COBO v1r3MDM

ACCESS CONTROL

MOTS-11-008800 - Motorola Solutions Android 11 must be configured to enforce that Wi-Fi Sharing is disabled.AirWatch - DISA Motorola Solutions Android 11 COBO v1r3MDM

CONFIGURATION MANAGEMENT

MOTS-11-009000 - Motorola Solutions Android 11 must have the DoD root and intermediate PKI certificates installed.MobileIron - DISA Motorola Solutions Android 11 COBO v1r3MDM

CONFIGURATION MANAGEMENT

O19C-00-002000 - Oracle Database must generate audit records for the DOD-selected list of auditable events, when successfully accessed, added, modified, or deleted, to the extent such information is available.DISA Oracle Database 19c STIG v1r3 OracleDBOracleDB

AUDIT AND ACCOUNTABILITY

O19C-00-008700 - Fixed user and PUBLIC Database links must be authorized for use.DISA Oracle Database 19c STIG v1r3 OracleDBOracleDB

CONFIGURATION MANAGEMENT

O19C-00-009800 - Object permissions granted to PUBLIC must be restricted.DISA Oracle Database 19c STIG v1r3 OracleDBOracleDB

CONFIGURATION MANAGEMENT

O19C-00-010000 - Application role permissions must not be assigned to the Oracle PUBLIC role.DISA Oracle Database 19c STIG v1r3 OracleDBOracleDB

CONFIGURATION MANAGEMENT

O19C-00-010100 - Oracle application administration roles must be disabled if not required and authorized.DISA Oracle Database 19c STIG v1r3 OracleDBOracleDB

CONFIGURATION MANAGEMENT

O19C-00-010400 - The directories assigned to the LOG_ARCHIVE_DEST* parameters must be protected from unauthorized access.DISA Oracle Database 19c STIG v1r3 OracleDBOracleDB

CONFIGURATION MANAGEMENT

O19C-00-010600 - Oracle Database production application and data directories must be protected from developers on shared production/development database management system (DBMS) host systems.DISA Oracle Database 19c STIG v1r3 OracleDBOracleDB

CONFIGURATION MANAGEMENT

O19C-00-011200 - Network access to Oracle Database must be restricted to authorized personnel.DISA Oracle Database 19c STIG v1r3 UnixUnix

CONFIGURATION MANAGEMENT

O19C-00-011500 - The /diag subdirectory under the directory assigned to the DIAGNOSTIC_DEST parameter must be protected from unauthorized access.DISA Oracle Database 19c STIG v1r3 OracleDBOracleDB

CONFIGURATION MANAGEMENT

O19C-00-011700 - Network client connections must be restricted to supported versions.DISA Oracle Database 19c STIG v1r3 UnixUnix

CONFIGURATION MANAGEMENT

O19C-00-012000 - Oracle Database must provide a mechanism to automatically identify accounts designated as temporary or emergency accounts.DISA Oracle Database 19c STIG v1r3 OracleDBOracleDB

CONFIGURATION MANAGEMENT

O19C-00-013000 - Unused database components, database management system (DBMS) software, and database objects must be removed.DISA Oracle Database 19c STIG v1r3 OracleDBOracleDB

CONFIGURATION MANAGEMENT

O19C-00-013300 - Use of external executables must be authorized.DISA Oracle Database 19c STIG v1r3 OracleDBOracleDB

CONFIGURATION MANAGEMENT

O19C-00-013700 - Oracle Database must ensure users are authenticated with an individual authenticator prior to using a shared authenticator.DISA Oracle Database 19c STIG v1r3 OracleDBOracleDB

IDENTIFICATION AND AUTHENTICATION

O19C-00-013800 - Oracle Database must uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).DISA Oracle Database 19c STIG v1r3 OracleDBOracleDB

IDENTIFICATION AND AUTHENTICATION

O19C-00-017900 - Oracle Database must check the validity of data inputs.DISA Oracle Database 19c STIG v1r3 OracleDBOracleDB

SYSTEM AND INFORMATION INTEGRITY

O19C-00-018400 - Oracle Database must restrict error messages so only authorized personnel may view them.DISA Oracle Database 19c STIG v1r3 OracleDBOracleDB

SYSTEM AND INFORMATION INTEGRITY

O19C-00-020600 - A minimum of three Oracle redo log groups/files must be defined and configured to be stored on separate, archived physical disks or archived directories on a RAID device. In addition, each Oracle redo log group must have a minimum of two Oracle redo log members (files).DISA Oracle Database 19c STIG v1r3 OracleDBOracleDB

CONFIGURATION MANAGEMENT

OL07-00-010063 - The Oracle Linux operating system must disable the login screen user list for graphical user interfaces.DISA Oracle Linux 7 STIG v3r5Unix

CONFIGURATION MANAGEMENT

OL07-00-040711 - The Oracle Linux operating system SSH daemon must prevent remote hosts from connecting to the proxy display.DISA Oracle Linux 7 STIG v3r5Unix

CONFIGURATION MANAGEMENT

OL08-00-010163 - The krb5-server package must not be installed on OL 8.DISA Oracle Linux 8 STIG v2r7Unix

IDENTIFICATION AND AUTHENTICATION

OL08-00-010190 - A sticky bit must be set on all OL 8 public directories to prevent unauthorized and unintended information transferred via shared system resources.DISA Oracle Linux 8 STIG v2r7Unix

SYSTEM AND COMMUNICATIONS PROTECTION

OL08-00-010260 - The OL 8 "/var/log" directory must be group-owned by root.DISA Oracle Linux 8 STIG v2r7Unix

SYSTEM AND INFORMATION INTEGRITY

OL08-00-010290 - The OL 8 SSH server must be configured to use only Message Authentication Codes (MACs) employing FIPS 140-3 validated cryptographic hash algorithms to protect the confidentiality of SSH server connections.DISA Oracle Linux 8 STIG v2r7Unix

MAINTENANCE

OL08-00-010379 - OL 8 must specify the default "include" directory for the /etc/sudoers file.DISA Oracle Linux 8 STIG v2r7Unix

CONFIGURATION MANAGEMENT

OL08-00-010421 - OL 8 must clear the page allocator to prevent use-after-free attacks.DISA Oracle Linux 8 STIG v2r7Unix

SYSTEM AND COMMUNICATIONS PROTECTION

OL08-00-010424 - OL 8 must not let Meltdown and Spectre exploit critical vulnerabilities in modern processors.DISA Oracle Linux 8 STIG v2r7Unix

CONFIGURATION MANAGEMENT

OL08-00-010571 - OL 8 must prevent files with the setuid and setgid bit set from being executed on the /boot directory.DISA Oracle Linux 8 STIG v2r7Unix

CONFIGURATION MANAGEMENT

OL08-00-010630 - OL 8 file systems must not execute binary files that are imported via Network File System (NFS).DISA Oracle Linux 8 STIG v2r7Unix

CONFIGURATION MANAGEMENT

OL08-00-010640 - OL 8 file systems must not interpret character or block special devices that are imported via Network File System (NFS).DISA Oracle Linux 8 STIG v2r7Unix

CONFIGURATION MANAGEMENT

OL08-00-010650 - OL 8 must prevent files with the setuid and setgid bit set from being executed on file systems that are imported via Network File System (NFS).DISA Oracle Linux 8 STIG v2r7Unix

CONFIGURATION MANAGEMENT

OL08-00-010675 - OL 8 must disable core dump backtraces.DISA Oracle Linux 8 STIG v2r7Unix

CONFIGURATION MANAGEMENT

OL08-00-010690 - Executable search paths within the initialization files of all local interactive OL 8 users must only contain paths that resolve to the system default or the user's home directory.DISA Oracle Linux 8 STIG v2r7Unix

CONFIGURATION MANAGEMENT

OL08-00-010700 - All OL 8 world-writable directories must be owned by root, sys, bin, or an application user.DISA Oracle Linux 8 STIG v2r7Unix

CONFIGURATION MANAGEMENT

OL08-00-010760 - All OL 8 local interactive user accounts must be assigned a home directory upon creation.DISA Oracle Linux 8 STIG v2r7Unix

CONFIGURATION MANAGEMENT

OL08-00-010770 - All OL 8 local initialization files must have mode "0740" or less permissive.DISA Oracle Linux 8 STIG v2r7Unix

CONFIGURATION MANAGEMENT

OL08-00-020040 - OL 8 must automatically exit interactive command shell user sessions after 10 minutes of inactivity.DISA Oracle Linux 8 STIG v2r7Unix

SYSTEM AND COMMUNICATIONS PROTECTION