Item Search

NameAudit NamePluginCategory
CASA-ND-000160 - The Cisco ASA must be configured to display the Standard Mandatory DoD Notice and Consent Banner before granting access to the device.DISA STIG Cisco ASA NDM v2r2Cisco

ACCESS CONTROL

CNTR-R2-000100 The Kubernetes Controller Manager must have secure binding.DISA Rancher Government Solutions RKE2 STIG v2r2Unix

ACCESS CONTROL

CNTR-R2-000940 Rancher RKE2 runtime must isolate security functions from nonsecurity functions.DISA Rancher Government Solutions RKE2 STIG v2r2Unix

SYSTEM AND COMMUNICATIONS PROTECTION

MYS8-00-000300 - MySQL Database Server 8.0 must produce audit records containing sufficient information to establish what type of events occurred.DISA Oracle MySQL 8.0 v2r2 DBMySQLDB

AUDIT AND ACCOUNTABILITY

MYS8-00-001400 - The audit information produced by the MySQL Database Server 8.0 must be protected from unauthorized deletion.DISA Oracle MySQL 8.0 v2r2 OS LinuxUnix

AUDIT AND ACCOUNTABILITY

MYS8-00-001500 - The MySQL Database Server 8.0 must protect against a user falsely repudiating having performed organization-defined actions.DISA Oracle MySQL 8.0 v2r2 DBMySQLDB

AUDIT AND ACCOUNTABILITY

MYS8-00-001600 - The MySQL Database Server 8.0 must be configured to provide audit record generation capability for DoD-defined auditable events within all database components.DISA Oracle MySQL 8.0 v2r2 DBMySQLDB

AUDIT AND ACCOUNTABILITY

MYS8-00-001700 - The MySQL Database Server 8.0 must allow only the Information System Security Manager (ISSM) (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited.DISA Oracle MySQL 8.0 v2r2 DBMySQLDB

AUDIT AND ACCOUNTABILITY

MYS8-00-001900 - The MySQL Database Server 8.0 must be able to generate audit records when unsuccessful attempts to retrieve privileges/permissions occur.DISA Oracle MySQL 8.0 v2r2 OS LinuxUnix

AUDIT AND ACCOUNTABILITY

MYS8-00-002000 - The MySQL Database Server 8.0 must be able to generate audit records when security objects are accessed.DISA Oracle MySQL 8.0 v2r2 DBMySQLDB

AUDIT AND ACCOUNTABILITY

MYS8-00-002300 - The MySQL Database Server 8.0 must generate audit records when unsuccessful attempts to access categories of information (e.g., classification levels/security levels) occur.DISA Oracle MySQL 8.0 v2r2 DBMySQLDB

AUDIT AND ACCOUNTABILITY

MYS8-00-002800 - The MySQL Database Server 8.0 must generate audit records when security objects are modified.DISA Oracle MySQL 8.0 v2r2 DBMySQLDB

AUDIT AND ACCOUNTABILITY

MYS8-00-003300 - The MySQL Database Server 8.0 must generate audit records when unsuccessful attempts to delete privileges/permissions occur.DISA Oracle MySQL 8.0 v2r2 DBMySQLDB

AUDIT AND ACCOUNTABILITY

MYS8-00-003500 - The MySQL Database Server 8.0 must generate audit records when unsuccessful attempts to delete security objects occur.DISA Oracle MySQL 8.0 v2r2 DBMySQLDB

AUDIT AND ACCOUNTABILITY

MYS8-00-003600 - The MySQL Database Server 8.0 must generate audit records when categories of information (e.g., classification levels/security levels) are deleted.DISA Oracle MySQL 8.0 v2r2 DBMySQLDB

AUDIT AND ACCOUNTABILITY

MYS8-00-003800 - The MySQL Database Server 8.0 must generate audit records when successful logons or connections occur.DISA Oracle MySQL 8.0 v2r2 DBMySQLDB

AUDIT AND ACCOUNTABILITY

MYS8-00-011000 - The MySQL Database Server 8.0 must associate organization-defined types of security labels having organization-defined security label values with information in transmission.DISA Oracle MySQL 8.0 v2r2 DBMySQLDB

ACCESS CONTROL

MYS8-00-011800 - The MySQL Database Server 8.0 must implement NIST FIPS 140-2 or 140-3 validated cryptographic modules to protect unclassified information requiring confidentiality and cryptographic protection, in accordance with the data owner's requirements.DISA Oracle MySQL 8.0 v2r2 DBMySQLDB

SYSTEM AND COMMUNICATIONS PROTECTION

OL08-00-030314 - OL 8 must generate audit records for any use of the 'setfiles' command.DISA Oracle Linux 8 STIG v2r2Unix

AUDIT AND ACCOUNTABILITY

OL08-00-030603 - OL 8 must enable Linux audit logging for the USBGuard daemon.DISA Oracle Linux 8 STIG v2r2Unix

AUDIT AND ACCOUNTABILITY

OL08-00-030610 - OL 8 must allow only the Information System Security Manager (ISSM) (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited.DISA Oracle Linux 8 STIG v2r2Unix

AUDIT AND ACCOUNTABILITY

OL08-00-040001 - OL 8 must not have any automated bug reporting tools installed.DISA Oracle Linux 8 STIG v2r2Unix

CONFIGURATION MANAGEMENT

OL08-00-040002 - OL 8 must not have the sendmail package installed.DISA Oracle Linux 8 STIG v2r2Unix

CONFIGURATION MANAGEMENT

OL08-00-040020 - OL 8 must cover or disable the built-in or attached camera when not in use.DISA Oracle Linux 8 STIG v2r2Unix

CONFIGURATION MANAGEMENT

OL08-00-040021 - OL 8 must not have the asynchronous transfer mode (ATM) kernel module installed if not required for operational support.DISA Oracle Linux 8 STIG v2r2Unix

CONFIGURATION MANAGEMENT

OL08-00-040210 - OL 8 must prevent IPv6 Internet Control Message Protocol (ICMP) redirect messages from being accepted.DISA Oracle Linux 8 STIG v2r2Unix

CONFIGURATION MANAGEMENT

OL08-00-040279 - OL 8 must ignore IPv4 Internet Control Message Protocol (ICMP) redirect messages.DISA Oracle Linux 8 STIG v2r2Unix

CONFIGURATION MANAGEMENT

OL08-00-040281 - OL 8 must disable access to the network 'bpf' syscall from unprivileged processes.DISA Oracle Linux 8 STIG v2r2Unix

CONFIGURATION MANAGEMENT

OL08-00-040341 - The OL 8 SSH daemon must prevent remote hosts from connecting to the proxy display.DISA Oracle Linux 8 STIG v2r2Unix

CONFIGURATION MANAGEMENT

OL08-00-040370 - OL 8 must not have the 'gssproxy' package installed if not required for operational support.DISA Oracle Linux 8 STIG v2r2Unix

CONFIGURATION MANAGEMENT

OL08-00-040380 - OL 8 must not have the 'iprutils' package installed if not required for operational support.DISA Oracle Linux 8 STIG v2r2Unix

CONFIGURATION MANAGEMENT

SLES-15-010010 - Vendor-packaged SUSE operating system security patches and updates must be installed and up to date.DISA SLES 15 STIG v2r2Unix

SYSTEM AND INFORMATION INTEGRITY

SLES-15-010120 - The SUSE operating system must initiate a session lock after a 15-minute period of inactivity for the graphical user interface (GUI).DISA SLES 15 STIG v2r2Unix

ACCESS CONTROL

SLES-15-010130 - The SUSE operating system must initiate a session lock after a 10-minute period of inactivity.DISA SLES 15 STIG v2r2Unix

ACCESS CONTROL

SLES-15-010300 - The sticky bit must be set on all SUSE operating system world-writable directories.DISA SLES 15 STIG v2r2Unix

SYSTEM AND COMMUNICATIONS PROTECTION

SLES-15-020120 - The SUSE operating system must display the date and time of the last successful account logon upon an SSH logon.DISA SLES 15 STIG v2r2Unix

ACCESS CONTROL

SLES-15-020290 - The SUSE operating system must prevent the use of dictionary words for passwords.DISA SLES 15 STIG v2r2Unix

CONFIGURATION MANAGEMENT

SLES-15-030570 - The Information System Security Officer (ISSO) and System Administrator (SA), at a minimum, must be alerted of a SUSE operating system audit processing failure event.DISA SLES 15 STIG v2r2Unix

AUDIT AND ACCOUNTABILITY

SLES-15-030780 - The SUSE operating system must generate audit records for the /var/log/btmp file.DISA SLES 15 STIG v2r2Unix

AUDIT AND ACCOUNTABILITY

SLES-15-030820 - The SUSE operating system must not disable syscall auditing.DISA SLES 15 STIG v2r2Unix

CONFIGURATION MANAGEMENT

SLES-15-040080 - All SUSE operating system local interactive user home directories defined in the /etc/passwd file must exist.DISA SLES 15 STIG v2r2Unix

CONFIGURATION MANAGEMENT

SLES-15-040090 - All SUSE operating system local interactive user home directories must have mode 0750 or less permissive.DISA SLES 15 STIG v2r2Unix

CONFIGURATION MANAGEMENT

SLES-15-040220 - The SUSE operating system must be configured to not overwrite Pluggable Authentication Modules (PAM) configuration on package changes.DISA SLES 15 STIG v2r2Unix

CONFIGURATION MANAGEMENT

SLES-15-040250 - The SUSE operating system SSH daemon private host key files must have mode 0640 or less permissive.DISA SLES 15 STIG v2r2Unix

CONFIGURATION MANAGEMENT

SLES-15-040260 - The SUSE operating system SSH daemon must perform strict mode checking of home directory configuration files.DISA SLES 15 STIG v2r2Unix

CONFIGURATION MANAGEMENT

SLES-15-040290 - The SUSE operating system SSH daemon must disable forwarded remote X connections for interactive users, unless to fulfill documented and validated mission requirements.DISA SLES 15 STIG v2r2Unix

CONFIGURATION MANAGEMENT

SLES-15-040350 - The SUSE operating system must not allow interfaces to accept Internet Protocol version 6 (IPv6) Internet Control Message Protocol (ICMP) redirect messages by default.DISA SLES 15 STIG v2r2Unix

CONFIGURATION MANAGEMENT

SLES-15-040360 - The SUSE operating system must not allow interfaces to send Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirect messages by default.DISA SLES 15 STIG v2r2Unix

CONFIGURATION MANAGEMENT

SLES-15-040381 - The SUSE operating system must not be performing Internet Protocol version 6 (IPv6) packet forwarding unless the system is a router.DISA SLES 15 STIG v2r2Unix

CONFIGURATION MANAGEMENT

SLES-15-040420 - The SUSE operating system default permissions must be defined in such a way that all authenticated users can only read and modify their own files.DISA SLES 15 STIG v2r2Unix

CONFIGURATION MANAGEMENT