Item Search

NameAudit NamePluginCategory
CISC-RT-000235 - The Cisco router must be configured to have Cisco Express Forwarding enabled.DISA Cisco IOS Router RTR STIG v3r3Cisco

CONFIGURATION MANAGEMENT

CISC-RT-000237 - The Cisco router must not be configured to use IPv6 Site Local Unicast addresses.DISA Cisco IOS XR Router RTR STIG v3r2Cisco

CONFIGURATION MANAGEMENT

ESXI-80-000005 - The ESXi host must enforce the limit of three consecutive invalid logon attempts by a user.DISA VMware vSphere 8.0 ESXi STIG v2r3VMware

ACCESS CONTROL

ESXI-80-000047 - The ESXi host must be configured to disable nonessential capabilities by disabling the Managed Object Browser (MOB).DISA VMware vSphere 8.0 ESXi STIG v2r3VMware

CONFIGURATION MANAGEMENT

ESXI-80-000220 - The ESXi host must restrict the use of Virtual Guest Tagging (VGT) on standard switches.DISA VMware vSphere 8.0 ESXi STIG v2r3VMware

CONFIGURATION MANAGEMENT

ESXI-80-000225 - The ESXi host must enable volatile key destruction.DISA VMware vSphere 8.0 ESXi STIG v2r3VMware

CONFIGURATION MANAGEMENT

ESXI-80-000228 - The ESXi Common Information Model (CIM) service must be disabled.DISA VMware vSphere 8.0 ESXi STIG v2r3VMware

CONFIGURATION MANAGEMENT

ESXI-80-000243 - The ESXi host must configure a persistent log location for all locally stored logs.DISA VMware vSphere 8.0 ESXi STIG v2r3VMware

AUDIT AND ACCOUNTABILITY

ESXI-80-000246 - The ESXi host must not enable log filtering.DISA VMware vSphere 8.0 ESXi STIG v2r3VMware

CONFIGURATION MANAGEMENT

FFOX-00-000020 - Firefox search suggestions must be disabled.DISA STIG Mozilla Firefox Windows v6r6Windows

CONFIGURATION MANAGEMENT

FFOX-00-000029 - The Firefox New Tab page must not show Top Sites, Sponsored Top Sites, Pocket Recommendations, Sponsored Pocket Stories, Searches, Highlights, or Snippets.DISA STIG Mozilla Firefox Windows v6r6Windows

CONFIGURATION MANAGEMENT

FFOX-00-000037 - Firefox encrypted media extensions must be disabled.DISA STIG Mozilla Firefox Windows v6r6Windows

CONFIGURATION MANAGEMENT

FFOX-00-000038 - Pocket must be disabled.DISA STIG Mozilla Firefox Windows v6r6Windows

CONFIGURATION MANAGEMENT

JUEX-L2-000070 - The Juniper EX switch must be configured to authenticate all network-connected endpoint devices before establishing any connection.DISA Juniper EX Series Layer 2 Switch v2r3Juniper

IDENTIFICATION AND AUTHENTICATION

JUEX-L2-000090 - The Juniper EX switch must be configured to enable BPDU Protection on all user-facing or untrusted access switch ports.DISA Juniper EX Series Layer 2 Switch v2r3Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

JUEX-L2-000170 - If STP is used, the Juniper EX switch must be configured to implement Rapid STP, or Multiple STP, where VLANs span multiple switches with redundant links.DISA Juniper EX Series Layer 2 Switch v2r3Juniper

CONFIGURATION MANAGEMENT

JUEX-L2-000220 - The Juniper EX switch must not use the default VLAN for management traffic.DISA Juniper EX Series Layer 2 Switch v2r3Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

JUEX-L2-000240 - The Juniper EX switch must not have a native VLAN ID assigned, or have a unique native VLAN ID, for all 802.1q trunk links.DISA Juniper EX Series Layer 2 Switch v2r3Juniper

CONFIGURATION MANAGEMENT

JUEX-NM-000130 - The Juniper EX switch must be configured to produce audit records containing information to establish when (date and time) the events occurred.DISA Juniper EX Series Network Device Management v2r3Juniper

AUDIT AND ACCOUNTABILITY

JUEX-NM-000140 - The Juniper EX switch must be configured to produce audit records containing information to establish where the events occurred.DISA Juniper EX Series Network Device Management v2r3Juniper

AUDIT AND ACCOUNTABILITY

JUEX-NM-000170 - The Juniper EX switch must be configured to generate audit records containing information that establishes the identity of any individual or process associated with the event.DISA Juniper EX Series Network Device Management v2r3Juniper

AUDIT AND ACCOUNTABILITY

JUEX-NM-000580 - The Juniper EX switch must be configured to generate audit records showing starting and ending time for administrator access to the system.DISA Juniper EX Series Network Device Management v2r3Juniper

AUDIT AND ACCOUNTABILITY

O19C-00-000200 - Oracle Database must protect against or limit the effects of organization-defined types of denial-of-service (DoS) attacks.DISA Oracle Database 19c STIG v1r1 WindowsWindows

ACCESS CONTROL

O19C-00-002000 - Oracle Database must generate audit records for the DOD-selected list of auditable events, when successfully accessed, added, modified, or deleted, to the extent such information is available.DISA Oracle Database 19c STIG v1r1 DatabaseOracleDB

AUDIT AND ACCOUNTABILITY

O19C-00-009200 - The Oracle REMOTE_OS_ROLES parameter must be set to FALSE.DISA Oracle Database 19c STIG v1r1 DatabaseOracleDB

CONFIGURATION MANAGEMENT

O19C-00-012200 - Oracle Database must be protected from unauthorized access by developers on shared production/development host systems.DISA Oracle Database 19c STIG v1r1 DatabaseOracleDB

CONFIGURATION MANAGEMENT

O19C-00-013200 - OS accounts used to run external procedures called by Oracle Database must have limited privileges.DISA Oracle Database 19c STIG v1r1 WindowsWindows

CONFIGURATION MANAGEMENT

O19C-00-013400 - Access to external executables must be disabled or restricted.DISA Oracle Database 19c STIG v1r1 WindowsWindows

CONFIGURATION MANAGEMENT

O19C-00-017600 - Access to Oracle Database files must be limited to relevant processes and to authorized, administrative users.DISA Oracle Database 19c STIG v1r1 DatabaseOracleDB

SYSTEM AND COMMUNICATIONS PROTECTION

O19C-00-017900 - Oracle Database must check the validity of data inputs.DISA Oracle Database 19c STIG v1r1 DatabaseOracleDB

SYSTEM AND INFORMATION INTEGRITY

O19C-00-018000 - The database management system (DBMS) and associated applications must reserve the use of dynamic code execution for situations that require it.DISA Oracle Database 19c STIG v1r1 DatabaseOracleDB

SYSTEM AND INFORMATION INTEGRITY

O19C-00-018100 - The database management system (DBMS) and associated applications, when making use of dynamic code execution, must take steps against invalid values that may be used in a SQL injection attack, therefore resulting in steps to prevent a SQL injection attack.DISA Oracle Database 19c STIG v1r1 DatabaseOracleDB

SYSTEM AND INFORMATION INTEGRITY

O19C-00-020400 - Oracle Database must include only approved trust anchors in trust stores or certificate stores managed by the organization.DISA Oracle Database 19c STIG v1r1 UnixUnix

SYSTEM AND COMMUNICATIONS PROTECTION

OL09-00-000001 - The OL 9 operating system must implement cryptographic mechanisms to prevent unauthorized modification of all information at rest.DISA Oracle Linux 9 STIG v1r2Unix

SYSTEM AND COMMUNICATIONS PROTECTION

OL09-00-000065 - OL 9 must enable the SELinux targeted policy.DISA Oracle Linux 9 STIG v1r2Unix

SYSTEM AND INFORMATION INTEGRITY

OL09-00-000302 - OL 9 must use a file integrity tool that is configured to use FIPS 140-3-approved cryptographic hashes for validating file contents and directories.DISA Oracle Linux 9 STIG v1r2Unix

CONFIGURATION MANAGEMENT

OL09-00-000321 - OL 9 must enable the USBGuard package.DISA Oracle Linux 9 STIG v1r2Unix

IDENTIFICATION AND AUTHENTICATION

OL09-00-000370 - OL 9 must have the rng-tools package installed.DISA Oracle Linux 9 STIG v1r2Unix

CONFIGURATION MANAGEMENT

OL09-00-000745 - OL 9 must be configured so that successful/unsuccessful uses of the shutdown command generate an audit record.DISA Oracle Linux 9 STIG v1r2Unix

AUDIT AND ACCOUNTABILITY

OL09-00-002021 - OL 9 must prevent special devices on file systems that are used with removable media.DISA Oracle Linux 9 STIG v1r2Unix

CONFIGURATION MANAGEMENT

OL09-00-002303 - OL 9 must define default permissions for the system default profile.DISA Oracle Linux 9 STIG v1r2Unix

CONFIGURATION MANAGEMENT

OL09-00-002355 - OL 9 SSH daemon must not allow compression or must only allow compression after successful authentication.DISA Oracle Linux 9 STIG v1r2Unix

CONFIGURATION MANAGEMENT

OL09-00-002357 - OL 9 must not allow a noncertificate trusted host SSH logon to the system.DISA Oracle Linux 9 STIG v1r2Unix

CONFIGURATION MANAGEMENT

OL09-00-002381 - OL 9 must disable core dump backtraces.DISA Oracle Linux 9 STIG v1r2Unix

CONFIGURATION MANAGEMENT

OL09-00-002382 - OL 9 must disable storing core dumps.DISA Oracle Linux 9 STIG v1r2Unix

CONFIGURATION MANAGEMENT

OL09-00-002394 - OL 9 must clear the page allocator to prevent use-after-free attacks.DISA Oracle Linux 9 STIG v1r2Unix

SYSTEM AND COMMUNICATIONS PROTECTION

OL09-00-002502 - OL 9 SSH private host key files must have mode 0640 or less permissive.DISA Oracle Linux 9 STIG v1r2Unix

CONFIGURATION MANAGEMENT

OL09-00-002516 - OL 9 world-writable directories must be owned by root, sys, bin, or an application user.DISA Oracle Linux 9 STIG v1r2Unix

SYSTEM AND COMMUNICATIONS PROTECTION

OL09-00-002531 - OL 9 /boot/grub2/grub.cfg file must be owned by root.DISA Oracle Linux 9 STIG v1r2Unix

CONFIGURATION MANAGEMENT

SPLK-CL-000130 - Splunk Enterprise must be configured to retain the DoD-defined attributes of the log records sent by the devices and hosts.DISA STIG Splunk Enterprise 8.x for Linux v2r2 STIG REST APISplunk

AUDIT AND ACCOUNTABILITY