AIX7-00-001028 - AIX must provide the lock command to let users retain their session lock until users are reauthenticated. | DISA STIG AIX 7.x v3r1 | Unix | ACCESS CONTROL |
AIX7-00-001029 - AIX must provide xlock command in the CDE environment to let users retain their sessions lock until users are reauthenticated. | DISA STIG AIX 7.x v3r1 | Unix | ACCESS CONTROL |
AIX7-00-001035 - The Group Identifiers (GIDs) reserved for AIX system accounts must not be assigned to non-system accounts as their primary group GID. | DISA STIG AIX 7.x v3r1 | Unix | CONFIGURATION MANAGEMENT |
AIX7-00-001047 - The AIX /etc/passwd, /etc/security/passwd, and/or /etc/group files must not contain a plus (+) without defining entries for NIS+ netgroups or LDAP netgroups. | DISA STIG AIX 7.x v3r1 | Unix | CONFIGURATION MANAGEMENT |
AIX7-00-002063 - AIX must be configured with a default gateway for IPv4 if the system uses IPv4, unless the system is a router. | DISA STIG AIX 7.x v3r1 | Unix | CONFIGURATION MANAGEMENT |
AIX7-00-002065 - AIX must be configured with a default gateway for IPv6 if the system uses IPv6 unless the system is a router. | DISA STIG AIX 7.x v3r1 | Unix | CONFIGURATION MANAGEMENT |
AIX7-00-002102 - On AIX, the SSH server must not permit root logins using remote access programs. | DISA STIG AIX 7.x v3r1 | Unix | CONFIGURATION MANAGEMENT |
AIX7-00-002116 - AIX SSH daemon must perform strict mode checking of home directory configuration files. | DISA STIG AIX 7.x v3r1 | Unix | CONFIGURATION MANAGEMENT |
AIX7-00-002124 - If AIX SSH daemon is required, the SSH daemon must only listen on the approved listening IP addresses. | DISA STIG AIX 7.x v3r1 | Unix | CONFIGURATION MANAGEMENT |
AIX7-00-003018 - All AIX users home directories must have mode 0750 or less permissive. | DISA STIG AIX 7.x v3r1 | Unix | CONFIGURATION MANAGEMENT |
AIX7-00-003042 - The AIX qdaemon must be disabled if local or remote printing is not required. | DISA STIG AIX 7.x v3r1 | Unix | CONFIGURATION MANAGEMENT |
AIX7-00-003047 - If sendmail is not required on AIX, the sendmail service must be disabled. | DISA STIG AIX 7.x v3r1 | Unix | CONFIGURATION MANAGEMENT |
AIX7-00-003054 - If AIX server is not functioning as a DNS server, the named daemon must be disabled. | DISA STIG AIX 7.x v3r1 | Unix | CONFIGURATION MANAGEMENT |
AIX7-00-003066 - The ttdbserver daemon must be disabled on AIX. | DISA STIG AIX 7.x v3r1 | Unix | CONFIGURATION MANAGEMENT |
AIX7-00-003075 - The rstatd daemon must be disabled on AIX. | DISA STIG AIX 7.x v3r1 | Unix | CONFIGURATION MANAGEMENT |
AIX7-00-003082 - The imap2 service must be disabled on AIX. | DISA STIG AIX 7.x v3r1 | Unix | CONFIGURATION MANAGEMENT |
AIX7-00-003101 - The AIX system must have no .netrc files on the system. | DISA STIG AIX 7.x v3r1 | Unix | IDENTIFICATION AND AUTHENTICATION |
AIX7-00-003105 - The rwalld daemon must be disabled on AIX. | DISA STIG AIX 7.x v3r1 | Unix | CONFIGURATION MANAGEMENT |
AIX7-00-003113 - AIX must not use removable media as the boot loader. | DISA STIG AIX 7.x v3r1 | Unix | CONFIGURATION MANAGEMENT |
AIX7-00-003132 - The AIX DHCP client must not send dynamic DNS updates. | DISA STIG AIX 7.x v3r1 | Unix | CONFIGURATION MANAGEMENT |
APPL-11-000016 - The macOS system must be integrated into a directory services infrastructure. | DISA STIG Apple macOS 11 v1r5 | Unix | CONFIGURATION MANAGEMENT |
APPL-11-000016 - The macOS system must be integrated into a directory services infrastructure. | DISA STIG Apple macOS 11 v1r8 | Unix | CONFIGURATION MANAGEMENT |
APPL-11-000022 - The macOS system must enforce the limit of three consecutive invalid logon attempts by a user before the user account is locked - minutesUntilFailedLoginReset | DISA STIG Apple macOS 11 v1r5 | Unix | ACCESS CONTROL |
APPL-11-002068 - The macOS system must set permissions on user home directories to prevent users from having access to read or modify another user's files - Access Control List | DISA STIG Apple macOS 11 v1r8 | Unix | CONFIGURATION MANAGEMENT |
APPL-11-002068 - The macOS system must set permissions on user home directories to prevent users from having access to read or modify another user's files - User directory permissions | DISA STIG Apple macOS 11 v1r8 | Unix | CONFIGURATION MANAGEMENT |
APPL-11-002068 - The macOS system must set permissions on user home directories to prevent users from having access to read or modify another user's files - User subdirectory permissions | DISA STIG Apple macOS 11 v1r8 | Unix | CONFIGURATION MANAGEMENT |
APPL-11-002068 - The macOS system must set permissions on user home directories to prevent users from having access to read or modify another user's files - User subdirectory Public permissions | DISA STIG Apple macOS 11 v1r8 | Unix | CONFIGURATION MANAGEMENT |
APPL-11-005050 - The macOS Application Firewall must be enabled - EnableStealthMode | DISA STIG Apple macOS 11 v1r8 | Unix | CONFIGURATION MANAGEMENT |
APPL-13-003012 - The macOS system must be configured to prevent displaying password hints. | DISA STIG Apple macOS 13 v1r4 | Unix | CONFIGURATION MANAGEMENT |
O121-BP-025600 - Network access to the DBMS must be restricted to authorized personnel. | DISA STIG Oracle 12c v3r2 Database | OracleDB | CONFIGURATION MANAGEMENT |
O121-BP-025600 - Network access to the DBMS must be restricted to authorized personnel. | DISA STIG Oracle 12c v3r2 Linux | Unix | CONFIGURATION MANAGEMENT |
OL07-00-010291 - The Oracle Linux operating system must not have accounts configured with blank or null passwords. | DISA Oracle Linux 7 STIG v3r1 | Unix | CONFIGURATION MANAGEMENT |
OL07-00-020250 - The Oracle Linux operating system must be a vendor supported release. | DISA Oracle Linux 7 STIG v3r1 | Unix | CONFIGURATION MANAGEMENT |
OL07-00-020330 - The Oracle Linux operating system must be configured so that all files and directories have a valid group owner. | DISA Oracle Linux 7 STIG v3r1 | Unix | CONFIGURATION MANAGEMENT |
OL07-00-021120 - The Oracle Linux operating system must be configured so that the cron.allow file, if it exists, is group-owned by root. | DISA Oracle Linux 7 STIG v3r1 | Unix | CONFIGURATION MANAGEMENT |
OL07-00-021320 - The Oracle Linux operating system must use a separate file system for /var. | DISA Oracle Linux 7 STIG v3r1 | Unix | CONFIGURATION MANAGEMENT |
OL07-00-021600 - The Oracle Linux operating system must be configured so that the file integrity tool is configured to verify Access Control Lists (ACLs) | DISA Oracle Linux 7 STIG v3r1 | Unix | CONFIGURATION MANAGEMENT |
OL07-00-040410 - The Oracle Linux operating system must be configured so that the SSH public host key files have mode 0644 or less permissive. | DISA Oracle Linux 7 STIG v3r1 | Unix | CONFIGURATION MANAGEMENT |
OL07-00-040420 - The Oracle Linux operating system must be configured so the SSH private host key files have mode 0640 or less permissive. | DISA Oracle Linux 7 STIG v3r1 | Unix | CONFIGURATION MANAGEMENT |
OL08-00-010121 - The OL 8 operating system must not have accounts configured with blank or null passwords. | DISA Oracle Linux 8 STIG v2r2 | Unix | CONFIGURATION MANAGEMENT |
WN16-00-000240 - System files must be monitored for unauthorized changes. | DISA Windows Server 2016 STIG v2r9 | Windows | CONFIGURATION MANAGEMENT |
WN16-AC-000060 - Windows Server 2016 minimum password age must be configured to at least one day. | DISA Windows Server 2016 STIG v2r9 | Windows | IDENTIFICATION AND AUTHENTICATION |
WN16-AC-000090 - Windows Server 2016 reversible password encryption must be disabled. | DISA Windows Server 2016 STIG v2r9 | Windows | IDENTIFICATION AND AUTHENTICATION |
WN16-CC-000080 - Insecure logons to an SMB server must be disabled. | DISA Windows Server 2016 STIG v2r9 | Windows | CONFIGURATION MANAGEMENT |
WN16-CC-000320 - The System event log size must be configured to 32768 KB or greater. | DISA Windows Server 2016 STIG v2r9 | Windows | AUDIT AND ACCOUNTABILITY |
WN16-CC-000330 - Windows Server 2016 Windows SmartScreen must be enabled. | DISA Windows Server 2016 STIG v2r9 | Windows | CONFIGURATION MANAGEMENT |
WN16-DC-000360 - The Allow log on through Remote Desktop Services user right must only be assigned to the Administrators group. | DISA Windows Server 2016 STIG v2r9 | Windows | ACCESS CONTROL |
WN16-SO-000270 - Anonymous enumeration of shares must not be allowed. | DISA Windows Server 2016 STIG v2r9 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
WN16-SO-000340 - PKU2U authentication using online identities must be prevented. | DISA Windows Server 2016 STIG v2r9 | Windows | CONFIGURATION MANAGEMENT |
WN16-UR-000230 - The Increase scheduling priority user right must only be assigned to the Administrators group. | DISA Windows Server 2016 STIG v2r9 | Windows | ACCESS CONTROL |