Audits
Settings
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Theme
Light
Dark
Auto
Help
Plugins
Overview
Plugins Pipeline
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
LCE Families
Tenable OT Security Families
About Plugin Families
Release Notes
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Policies
Overview
Search
AWS Resources
Azure Resources
GCP Resources
Kubernetes Resources
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Settings
Theme
Light
Dark
Auto
Detections
Plugins
Overview
Plugins Pipeline
Release Notes
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
LCE Families
Tenable OT Security Families
About Plugin Families
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Policies
Overview
Search
AWS Resources
Azure Resources
GCP Resources
Kubernetes Resources
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
Analytics
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
Audits
Item Search
Audits
Item Search
Filters (1)
Description
Filename
Plugin
References
Control ID
Relevance
Description
Plugin
Filename
References (Active)
Search by References
Clear All
‹‹ Previous
Previous
Page 8 of 15
• 737 Total
Next
Next ››
Name
Audit Name
Plugin
Category
EP11-00-012700 - The EDB Postgres Advanced Server must implement NIST FIPS 140-2 or 140-3 validated cryptographic modules to provision digital signatures - hostssl
EDB PostgreSQL Advanced Server v11 Windows OS Audit v2r2
Windows
EP11-00-012700 - The EDB Postgres Advanced Server must implement NIST FIPS 140-2 or 140-3 validated cryptographic modules to provision digital signatures - openssl_conf
EDB PostgreSQL Advanced Server v11 Windows OS Audit v2r2
Windows
EP11-00-012700 - The EDB Postgres Advanced Server must implement NIST FIPS 140-2 or 140-3 validated cryptographic modules to provision digital signatures.
EDB PostgreSQL Advanced Server v11 Windows OS Audit v2r3
Windows
F5BI-LT-000293 - The BIG-IP Core implementation must be configured to implement NIST FIPS-validated cryptography for digital signatures when providing encrypted traffic to virtual servers.
DISA F5 BIG-IP Local Traffic Manager 11.x STIG v2r2
F5
O365-OU-000011 - The minimum encryption key length in Outlook must be at least 168.
Microsoft Office 365 ProPlus v2.2.0
Windows
O365-OU-000011 - The minimum encryption key length in Outlook must be at least 168.
DISA STIG Microsoft Office 365 ProPlus v2r5
Windows
OH12-1X-000295 - OHS must have the SSLFIPS directive enabled to implement required cryptographic protections using cryptographic modules complying with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance when encrypting data that must be compartmentalized.
DISA STIG Oracle HTTP Server 12.1.3 v2r1
Unix
PANW-AG-000143 - The Palo Alto Networks security platform, if used for TLS/SSL decryption, must use NIST FIPS-validated cryptography to implement encryption.
DISA STIG Palo Alto ALG v2r3
Palo_Alto
PPS9-00-012800 - The EDB Postgres Advanced Server must implement NIST FIPS 140-2 or 140-3 validated cryptographic modules to generate and validate cryptographic hashes.
EDB PostgreSQL Advanced Server OS Linux Audit v2r2
Unix
PPS9-00-012900 - The EDB Postgres Advanced Server must implement NIST FIPS 140-2 or 140-3 validated cryptographic modules to protect unclassified information requiring confidentiality and cryptographic protection, in accordance with the requirements of the data owner.
EDB PostgreSQL Advanced Server OS Linux Audit v2r2
Unix
SLES-12-010420 - FIPS 140-2 mode must be enabled on the SUSE operating system.
DISA SLES 12 STIG v2r6
Unix
SLES-12-010420 - FIPS 140-2 mode must be enabled on the SUSE operating system.
DISA SLES 12 STIG v2r7
Unix
SLES-12-010420 - FIPS 140-2 mode must be enabled on the SUSE operating system.
DISA SLES 12 STIG v2r9
Unix
SOL-11.1-060060 - The operating system must employ FIPS-validate or NSA-approved cryptography to implement digital signatures.
DISA STIG Solaris 11 SPARC v2r9
Unix
SPLK-CL-000010 - Splunk Enterprise must be installed with FIPS mode enabled, to implement NIST FIPS 140-2 approved ciphers for all cryptographic functions.
DISA STIG Splunk Enterprise 7.x for Windows v2r4 REST API
Splunk
SQL6-D0-003200 - SQL Server must use NSA-approved cryptography to protect classified information in accordance with the data owners requirements - DB
DISA STIG SQL Server 2016 Database Audit v2r9
MS_SQLDB
SQL6-D0-003200 - SQL Server must use NSA-approved cryptography to protect classified information in accordance with the data owners requirements - OS
DISA STIG SQL Server 2016 Database Audit v2r5
MS_SQLDB
SQL6-D0-003200 - SQL Server must use NSA-approved cryptography to protect classified information in accordance with the data owners requirements - OS
DISA STIG SQL Server 2016 Database Audit v2r8
MS_SQLDB
SQL6-D0-015600 - SQL Server must implement NIST FIPS 140-2 or 140-3 validated cryptographic modules to provision digital signatures.
DISA STIG SQL Server 2016 Instance OS Audit v2r11
Windows
SQL6-D0-015700 - SQL Server must implement NIST FIPS 140-2 or 140-3 validated cryptographic modules to generate and validate cryptographic hashes.
DISA STIG SQL Server 2016 Instance OS Audit v2r8
Windows
SQL6-D0-015800 - SQL Server must implement NIST FIPS 140-2 or 140-3 validated cryptographic modules to protect unclassified information requiring confidentiality and cryptographic protection, in accordance with the data owners requirements.
DISA STIG SQL Server 2016 Instance OS Audit v2r8
Windows
SQL6-D0-015800 - SQL Server must implement NIST FIPS 140-2 or 140-3 validated cryptographic modules to protect unclassified information requiring confidentiality and cryptographic protection, in accordance with the data owners requirements.
DISA STIG SQL Server 2016 Instance OS Audit v2r12
Windows
SQL6-D0-015800 - SQL Server must implement NIST FIPS 140-2 or 140-3 validated cryptographic modules to protect unclassified information requiring confidentiality and cryptographic protection, in accordance with the data owners requirements.
DISA STIG SQL Server 2016 Instance OS Audit v2r11
Windows
SQL6-D0-015800 - SQL Server must implement NIST FIPS 140-2 validated cryptographic modules to protect unclassified information requiring confidentiality and cryptographic protection, in accordance with the data owners requirements.
DISA STIG SQL Server 2016 Instance OS Audit v2r7
Windows
TCAT-AS-001640 - Application servers must use NIST-approved or NSA-approved key management technology and processes.
DISA STIG Apache Tomcat Application Server 9 v2r2
Unix
TCAT-AS-001640 - Application servers must use NIST-approved or NSA-approved key management technology and processes.
DISA STIG Apache Tomcat Application Server 9 v2r2 Middleware
Unix
TCAT-AS-001640 - Application servers must use NIST-approved or NSA-approved key management technology and processes.
DISA STIG Apache Tomcat Application Server 9 v2r3 Middleware
Unix
TCAT-AS-001640 - Application servers must use NIST-approved or NSA-approved key management technology and processes.
DISA STIG Apache Tomcat Application Server 9 v2r4 Middleware
Unix
TCAT-AS-001640 - Application servers must use NIST-approved or NSA-approved key management technology and processes.
DISA STIG Apache Tomcat Application Server 9 v2r5
Unix
TCAT-AS-001640 - Application servers must use NIST-approved or NSA-approved key management technology and processes.
DISA STIG Apache Tomcat Application Server 9 v2r5 Middleware
Unix
UBTU-18-010005 - The Ubuntu operating system must implement NIST FIPS-validated cryptography to protect classified information and for the following: to provision digital signatures, to generate cryptographic hashes, and to protect unclassified information requiring confidentiality and cryptographic protection in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.
DISA STIG Ubuntu 18.04 LTS v2r10
Unix
UBTU-18-010005 - The Ubuntu operating system must implement NIST FIPS-validated cryptography to protect classified information and for the following: to provision digital signatures, to generate cryptographic hashes, and to protect unclassified information requiring confidentiality and cryptographic protection in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.
DISA STIG Ubuntu 18.04 LTS v2r7
Unix
UBTU-18-010005 - The Ubuntu operating system must implement NIST FIPS-validated cryptography to protect classified information and for the following: to provision digital signatures, to generate cryptographic hashes, and to protect unclassified information requiring confidentiality and cryptographic protection in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.
DISA STIG Ubuntu 18.04 LTS v2r14
Unix
UBTU-18-010005 - The Ubuntu operating system must implement NIST FIPS-validated cryptography to protect classified information and for the following: to provision digital signatures, to generate cryptographic hashes, and to protect unclassified information requiring confidentiality and cryptographic protection in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.
DISA STIG Ubuntu 18.04 LTS v2r11
Unix
UBTU-18-010005 - The Ubuntu operating system must implement NIST FIPS-validated cryptography to protect classified information and for the following: to provision digital signatures, to generate cryptographic hashes, and to protect unclassified information requiring confidentiality and cryptographic protection in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.
DISA STIG Ubuntu 18.04 LTS v2r12
Unix
UBTU-18-010005 - The Ubuntu operating system must implement NIST FIPS-validated cryptography to protect classified information and for the following: to provision digital signatures, to generate cryptographic hashes, and to protect unclassified information requiring confidentiality and cryptographic protection in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.
DISA STIG Ubuntu 18.04 LTS v2r13
Unix
WDNS-SC-000001 - The salt value for zones signed using NSEC3 RRs must be changed every time the zone is completely re-signed.
DISA Microsoft Windows 2012 Server DNS STIG v2r5
Windows
WN10-SO-000230 - The system must be configured to use FIPS-compliant algorithms for encryption, hashing, and signing.
DISA Windows 10 STIG v2r4
Windows
WN12-SO-000074 - The system must be configured to use FIPS-compliant algorithms for encryption, hashing, and signing.
DISA Windows Server 2012 and 2012 R2 MS STIG v3r5
Windows
WN12-SO-000074 - The system must be configured to use FIPS-compliant algorithms for encryption, hashing, and signing.
DISA Windows Server 2012 and 2012 R2 MS STIG v3r4
Windows
WN12-SO-000074 - The system must be configured to use FIPS-compliant algorithms for encryption, hashing, and signing.
DISA Windows Server 2012 and 2012 R2 DC STIG v3r4
Windows
WN12-SO-000074 - The system must be configured to use FIPS-compliant algorithms for encryption, hashing, and signing.
DISA Windows Server 2012 and 2012 R2 DC STIG v3r5
Windows
WN16-DC-000140 - Separate, NSA-approved (Type 1) cryptography must be used to protect the directory data in transit for directory service implementations at a classified confidentiality level when replication data traverses a network cleared to a lower level than the data
DISA Windows Server 2016 STIG v2r5
Windows
WN16-DC-000140 - Separate, NSA-approved (Type 1) cryptography must be used to protect the directory data in transit for directory service implementations at a classified confidentiality level when replication data traverses a network cleared to a lower level than the data.
DISA Windows Server 2016 STIG v2r2
Windows
WN19-DC-000140 - Windows Server 2019 must use separate, NSA-approved (Type 1) cryptography to protect the directory data in transit for directory service implementations at a classified confidentiality level when replication data traverses a network cleared to a lower level than the data.
DISA Windows Server 2019 STIG v2r2
Windows
WN19-DC-000140 - Windows Server 2019 must use separate, NSA-approved (Type 1) cryptography to protect the directory data in transit for directory service implementations at a classified confidentiality level when replication data traverses a network cleared to a lower level than the data.
DISA Windows Server 2019 STIG v2r4
Windows
WN19-DC-000140 - Windows Server 2019 must use separate, NSA-approved (Type 1) cryptography to protect the directory data in transit for directory service implementations at a classified confidentiality level when replication data traverses a network cleared to a lower level than the data.
DISA Windows Server 2019 STIG v2r3
Windows
WN19-DC-000140 - Windows Server 2019 must use separate, NSA-approved (Type 1) cryptography to protect the directory data in transit for directory service implementations at a classified confidentiality level when replication data traverses a network cleared to a lower level than the data.
DISA Windows Server 2019 STIG v2r5
Windows
WN19-SO-000360 - Windows Server 2019 must be configured to use FIPS-compliant algorithms for encryption, hashing, and signing.
DISA Windows Server 2019 STIG v2r4
Windows
WN19-SO-000360 - Windows Server 2019 must be configured to use FIPS-compliant algorithms for encryption, hashing, and signing.
DISA Windows Server 2019 STIG v2r7
Windows
‹‹ Previous
Previous
Page 8 of 15
• 737 Total
Next
Next ››