| MOTO-09-000400 - The Motorola Android Pie must be configured to lock the display after 15 minutes (or less) of inactivity - or less of inactivity. | AirWatch - DISA Motorola Android Pie.x COPE v1r2 | MDM | ACCESS CONTROL |
| MOTO-09-002800 - The Motorola Android Pie must be configured to disable developer modes. | MobileIron - DISA Motorola Android Pie.x COBO v1r2 | MDM | CONFIGURATION MANAGEMENT |
| MOTO-09-002800 - The Motorola Android Pie must be configured to disable developer modes. | MobileIron - DISA Motorola Android Pie.x COPE v1r2 | MDM | CONFIGURATION MANAGEMENT |
| MOTO-09-003500 - The Motorola Android Pie must be configured to disable USB mass storage mode. | MobileIron - DISA Motorola Android Pie.x COBO v1r2 | MDM | CONFIGURATION MANAGEMENT |
| MOTO-09-008700 - Motorola Android Pie users must complete required training. | MobileIron - DISA Motorola Android Pie.x COPE v1r2 | MDM | CONFIGURATION MANAGEMENT |
| MOTO-09-009400 - Motorola Android Pie work profile must be configured to enforce the system application disable list. | MobileIron - DISA Motorola Android Pie.x COPE v1r2 | MDM | CONFIGURATION MANAGEMENT |
| MOTO-09-009600 - Motorola Android Pie must be provisioned as a fully managed device and configured to create a work profile. | AirWatch - DISA Motorola Android Pie.x COPE v1r2 | MDM | CONFIGURATION MANAGEMENT |
| MOTO-09-010200 - Motorola Android Pie must be configured to disallow configuration of date and time. | MobileIron - DISA Motorola Android Pie.x COBO v1r2 | MDM | CONFIGURATION MANAGEMENT |
| MOTO-09-010200 - Motorola Android Pie must be configured to disallow configuration of date and time. | AirWatch - DISA Motorola Android Pie.x COPE v1r2 | MDM | CONFIGURATION MANAGEMENT |
| MOTS-11-000200 - Motorola Solutions Android 11 must be configured to not allow passwords that include more than two repeating or sequential characters - Numbers | AirWatch - DISA Motorola Solutions Android 11 COBO v1r3 | MDM | CONFIGURATION MANAGEMENT |
| MOTS-11-000300 - Motorola Solutions Android 11 must be configured to enable a screen-lock policy that will lock the display after a period of inactivity. | AirWatch - DISA Motorola Solutions Android 11 COBO v1r3 | MDM | ACCESS CONTROL |
| MOTS-11-008800 - Motorola Solutions Android 11 must be configured to enforce that Wi-Fi Sharing is disabled. | AirWatch - DISA Motorola Solutions Android 11 COBO v1r3 | MDM | CONFIGURATION MANAGEMENT |
| MOTS-11-009000 - Motorola Solutions Android 11 must have the DoD root and intermediate PKI certificates installed. | MobileIron - DISA Motorola Solutions Android 11 COBO v1r3 | MDM | CONFIGURATION MANAGEMENT |
| O19C-00-002000 - Oracle Database must generate audit records for the DOD-selected list of auditable events, when successfully accessed, added, modified, or deleted, to the extent such information is available. | DISA Oracle Database 19c STIG v1r3 OracleDB | OracleDB | AUDIT AND ACCOUNTABILITY |
| O19C-00-008700 - Fixed user and PUBLIC Database links must be authorized for use. | DISA Oracle Database 19c STIG v1r3 OracleDB | OracleDB | CONFIGURATION MANAGEMENT |
| O19C-00-009800 - Object permissions granted to PUBLIC must be restricted. | DISA Oracle Database 19c STIG v1r3 OracleDB | OracleDB | CONFIGURATION MANAGEMENT |
| O19C-00-010000 - Application role permissions must not be assigned to the Oracle PUBLIC role. | DISA Oracle Database 19c STIG v1r3 OracleDB | OracleDB | CONFIGURATION MANAGEMENT |
| O19C-00-010100 - Oracle application administration roles must be disabled if not required and authorized. | DISA Oracle Database 19c STIG v1r3 OracleDB | OracleDB | CONFIGURATION MANAGEMENT |
| O19C-00-010400 - The directories assigned to the LOG_ARCHIVE_DEST* parameters must be protected from unauthorized access. | DISA Oracle Database 19c STIG v1r3 OracleDB | OracleDB | CONFIGURATION MANAGEMENT |
| O19C-00-010600 - Oracle Database production application and data directories must be protected from developers on shared production/development database management system (DBMS) host systems. | DISA Oracle Database 19c STIG v1r3 OracleDB | OracleDB | CONFIGURATION MANAGEMENT |
| O19C-00-011200 - Network access to Oracle Database must be restricted to authorized personnel. | DISA Oracle Database 19c STIG v1r3 Unix | Unix | CONFIGURATION MANAGEMENT |
| O19C-00-011500 - The /diag subdirectory under the directory assigned to the DIAGNOSTIC_DEST parameter must be protected from unauthorized access. | DISA Oracle Database 19c STIG v1r3 OracleDB | OracleDB | CONFIGURATION MANAGEMENT |
| O19C-00-011700 - Network client connections must be restricted to supported versions. | DISA Oracle Database 19c STIG v1r3 Unix | Unix | CONFIGURATION MANAGEMENT |
| O19C-00-012000 - Oracle Database must provide a mechanism to automatically identify accounts designated as temporary or emergency accounts. | DISA Oracle Database 19c STIG v1r3 OracleDB | OracleDB | CONFIGURATION MANAGEMENT |
| O19C-00-013000 - Unused database components, database management system (DBMS) software, and database objects must be removed. | DISA Oracle Database 19c STIG v1r3 OracleDB | OracleDB | CONFIGURATION MANAGEMENT |
| O19C-00-013300 - Use of external executables must be authorized. | DISA Oracle Database 19c STIG v1r3 OracleDB | OracleDB | CONFIGURATION MANAGEMENT |
| O19C-00-013700 - Oracle Database must ensure users are authenticated with an individual authenticator prior to using a shared authenticator. | DISA Oracle Database 19c STIG v1r3 OracleDB | OracleDB | IDENTIFICATION AND AUTHENTICATION |
| O19C-00-013800 - Oracle Database must uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users). | DISA Oracle Database 19c STIG v1r3 OracleDB | OracleDB | IDENTIFICATION AND AUTHENTICATION |
| O19C-00-017900 - Oracle Database must check the validity of data inputs. | DISA Oracle Database 19c STIG v1r3 OracleDB | OracleDB | SYSTEM AND INFORMATION INTEGRITY |
| O19C-00-018400 - Oracle Database must restrict error messages so only authorized personnel may view them. | DISA Oracle Database 19c STIG v1r3 OracleDB | OracleDB | SYSTEM AND INFORMATION INTEGRITY |
| O19C-00-020600 - A minimum of three Oracle redo log groups/files must be defined and configured to be stored on separate, archived physical disks or archived directories on a RAID device. In addition, each Oracle redo log group must have a minimum of two Oracle redo log members (files). | DISA Oracle Database 19c STIG v1r3 OracleDB | OracleDB | CONFIGURATION MANAGEMENT |
| OL07-00-010063 - The Oracle Linux operating system must disable the login screen user list for graphical user interfaces. | DISA Oracle Linux 7 STIG v3r5 | Unix | CONFIGURATION MANAGEMENT |
| OL07-00-040711 - The Oracle Linux operating system SSH daemon must prevent remote hosts from connecting to the proxy display. | DISA Oracle Linux 7 STIG v3r5 | Unix | CONFIGURATION MANAGEMENT |
| OL08-00-010163 - The krb5-server package must not be installed on OL 8. | DISA Oracle Linux 8 STIG v2r7 | Unix | IDENTIFICATION AND AUTHENTICATION |
| OL08-00-010190 - A sticky bit must be set on all OL 8 public directories to prevent unauthorized and unintended information transferred via shared system resources. | DISA Oracle Linux 8 STIG v2r7 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
| OL08-00-010260 - The OL 8 "/var/log" directory must be group-owned by root. | DISA Oracle Linux 8 STIG v2r7 | Unix | SYSTEM AND INFORMATION INTEGRITY |
| OL08-00-010290 - The OL 8 SSH server must be configured to use only Message Authentication Codes (MACs) employing FIPS 140-3 validated cryptographic hash algorithms to protect the confidentiality of SSH server connections. | DISA Oracle Linux 8 STIG v2r7 | Unix | MAINTENANCE |
| OL08-00-010379 - OL 8 must specify the default "include" directory for the /etc/sudoers file. | DISA Oracle Linux 8 STIG v2r7 | Unix | CONFIGURATION MANAGEMENT |
| OL08-00-010421 - OL 8 must clear the page allocator to prevent use-after-free attacks. | DISA Oracle Linux 8 STIG v2r7 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
| OL08-00-010424 - OL 8 must not let Meltdown and Spectre exploit critical vulnerabilities in modern processors. | DISA Oracle Linux 8 STIG v2r7 | Unix | CONFIGURATION MANAGEMENT |
| OL08-00-010571 - OL 8 must prevent files with the setuid and setgid bit set from being executed on the /boot directory. | DISA Oracle Linux 8 STIG v2r7 | Unix | CONFIGURATION MANAGEMENT |
| OL08-00-010630 - OL 8 file systems must not execute binary files that are imported via Network File System (NFS). | DISA Oracle Linux 8 STIG v2r7 | Unix | CONFIGURATION MANAGEMENT |
| OL08-00-010640 - OL 8 file systems must not interpret character or block special devices that are imported via Network File System (NFS). | DISA Oracle Linux 8 STIG v2r7 | Unix | CONFIGURATION MANAGEMENT |
| OL08-00-010650 - OL 8 must prevent files with the setuid and setgid bit set from being executed on file systems that are imported via Network File System (NFS). | DISA Oracle Linux 8 STIG v2r7 | Unix | CONFIGURATION MANAGEMENT |
| OL08-00-010675 - OL 8 must disable core dump backtraces. | DISA Oracle Linux 8 STIG v2r7 | Unix | CONFIGURATION MANAGEMENT |
| OL08-00-010690 - Executable search paths within the initialization files of all local interactive OL 8 users must only contain paths that resolve to the system default or the user's home directory. | DISA Oracle Linux 8 STIG v2r7 | Unix | CONFIGURATION MANAGEMENT |
| OL08-00-010700 - All OL 8 world-writable directories must be owned by root, sys, bin, or an application user. | DISA Oracle Linux 8 STIG v2r7 | Unix | CONFIGURATION MANAGEMENT |
| OL08-00-010760 - All OL 8 local interactive user accounts must be assigned a home directory upon creation. | DISA Oracle Linux 8 STIG v2r7 | Unix | CONFIGURATION MANAGEMENT |
| OL08-00-010770 - All OL 8 local initialization files must have mode "0740" or less permissive. | DISA Oracle Linux 8 STIG v2r7 | Unix | CONFIGURATION MANAGEMENT |
| OL08-00-020040 - OL 8 must automatically exit interactive command shell user sessions after 10 minutes of inactivity. | DISA Oracle Linux 8 STIG v2r7 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |