Item Search

NameAudit NamePluginCategory
AIX7-00-001006 - If the AIX system is using LDAP for authentication or account information, the LDAP SSL, or TLS connection must require the server provide a certificate and this certificate must have a valid path to a trusted CA - Certificate IssuerDISA STIG AIX 7.x v2r9Unix

IDENTIFICATION AND AUTHENTICATION

AIX7-00-001006 - If the AIX system is using LDAP for authentication or account information, the LDAP SSL, or TLS connection must require the server provide a certificate and this certificate must have a valid path to a trusted CA - ldapsslkeyfDISA STIG AIX 7.x v2r9Unix

IDENTIFICATION AND AUTHENTICATION

AIX7-00-001006 - If the AIX system is using LDAP for authentication or account information, the LDAP SSL, or TLS connection must require the server provide a certificate and this certificate must have a valid path to a trusted CA - useSSLDISA STIG AIX 7.x v2r9Unix

IDENTIFICATION AND AUTHENTICATION

AIX7-00-002110 - AIX must setup SSH daemon to disable revoked public keys.DISA STIG AIX 7.x v2r9Unix

IDENTIFICATION AND AUTHENTICATION

AIX7-00-003004 - AIX SSH private host key files must have mode 0600 or less permissive.DISA STIG AIX 7.x v2r9Unix

IDENTIFICATION AND AUTHENTICATION

AOSX-13-067035 - The macOS system must enable certificate for smartcards.DISA STIG Apple Mac OSX 10.13 v2r5Unix

IDENTIFICATION AND AUTHENTICATION

AOSX-14-003005 - The macOS system must map the authenticated identity to the user or group account for PKI-based authentication.DISA STIG Apple Mac OSX 10.14 v2r6Unix

IDENTIFICATION AND AUTHENTICATION

AS24-U2-000380 - The Apache web server must perform RFC 5280-compliant certification path validation.DISA STIG Apache Server 2.4 Unix Site v2r4 MiddlewareUnix

IDENTIFICATION AND AUTHENTICATION

AS24-U2-000380 - The Apache web server must perform RFC 5280-compliant certification path validation.DISA STIG Apache Server 2.4 Unix Site v2r4Unix

IDENTIFICATION AND AUTHENTICATION

AS24-U2-000390 - Only authenticated system administrators or the designated PKI Sponsor for the Apache web server must have access to the Apache web servers private key.DISA STIG Apache Server 2.4 Unix Site v2r4Unix

IDENTIFICATION AND AUTHENTICATION

AS24-W1-000380 - The Apache web server must perform RFC 5280-compliant certification path validation.DISA STIG Apache Server 2.4 Windows Server v2r3Windows

IDENTIFICATION AND AUTHENTICATION

AS24-W1-000380 - The Apache web server must perform RFC 5280-compliant certification path validation.DISA STIG Apache Server 2.4 Windows Server v3r1Windows

IDENTIFICATION AND AUTHENTICATION

AS24-W2-000380 - The Apache web server must perform RFC 5280-compliant certification path validation - SSLVerifyClientDISA STIG Apache Server 2.4 Windows Site v2r1Windows

IDENTIFICATION AND AUTHENTICATION

AS24-W2-000380 - The Apache web server must perform RFC 5280-compliant certification path validation - SSLVerifyDepthDISA STIG Apache Server 2.4 Windows Site v2r1Windows

IDENTIFICATION AND AUTHENTICATION

BIND-9X-001112 - The read and write access to a TSIG key file used by a BIND 9.x server must be restricted to only the account that runs the name server software.DISA BIND 9.x STIG v2r3Unix

IDENTIFICATION AND AUTHENTICATION

BIND-9X-001133 - The BIND 9.x server private key corresponding to the ZSK pair must be the only DNSSEC key kept on a name server that supports dynamic updates.DISA BIND 9.x STIG v2r3Unix

IDENTIFICATION AND AUTHENTICATION

DKER-EE-002380 - The certificate chain used by Universal Control Plane (UCP) client bundles must match what is defined in the System Security Plan (SSP) in Docker Enterprise.DISA STIG Docker Enterprise 2.x Linux/Unix v2r2Unix

IDENTIFICATION AND AUTHENTICATION

EP11-00-004600 - The EDB Postgres Advanced Server must enforce authorized access to all PKI private keys stored/utilized by the EDB Postgres Advanced Server.EDB PostgreSQL Advanced Server v11 Windows OS Audit v2r4Windows

IDENTIFICATION AND AUTHENTICATION

F5BI-LT-000085 - The BIG-IP Core implementation providing PKI-based, user authentication intermediary services must be configured to map the authenticated identity to the user account for PKI-based authentication to virtual servers.DISA F5 BIG-IP Local Traffic Manager STIG v2r3F5

IDENTIFICATION AND AUTHENTICATION

F5BI-LT-000203 - The BIG-IP Core implementation must be configured to deny-by-default all PKI-based authentication to virtual servers supporting path discovery and validation if unable to access revocation information via the network.DISA F5 BIG-IP Local Traffic Manager STIG v2r3F5

IDENTIFICATION AND AUTHENTICATION

IISW-SV-000129 - The IIS 8.5 web server must perform RFC 5280-compliant certification path validation.DISA IIS 8.5 Server v2r7Windows

IDENTIFICATION AND AUTHENTICATION

JRE8-WN-000100 - Oracle JRE 8 must set the option to enable online certificate validation - deployment.security.validation.ocspDISA STIG Oracle JRE 8 Windows v2r1Windows

IDENTIFICATION AND AUTHENTICATION

JRE8-WN-000100 - Oracle JRE 8 must set the option to enable online certificate validation - deployment.security.validation.ocsp.lockedDISA STIG Oracle JRE 8 Windows v2r1Windows

IDENTIFICATION AND AUTHENTICATION

JRE8-WN-000160 - Oracle JRE 8 must lock the option to enable users to check publisher certificates for revocation - deployment.security.revocation.checkDISA STIG Oracle JRE 8 Windows v2r1Windows

IDENTIFICATION AND AUTHENTICATION

O112-C1-015400 - The DBMS, when using PKI-based authentication, must enforce authorized access to the corresponding private key.DISA STIG Oracle 11.2g v2r5 WindowsWindows

IDENTIFICATION AND AUTHENTICATION

O112-C2-015300 - The DBMS, when utilizing PKI-based authentication, must validate certificates by constructing a certification path with status information to an accepted trust anchor.DISA STIG Oracle 11.2g v2r5 LinuxUnix

IDENTIFICATION AND AUTHENTICATION

O112-C2-015501 - Processes (services, applications, etc.) that connect to the DBMS independently of individual users, must use valid, current DoD-issued PKI certificates for authentication to the DBMS.DISA STIG Oracle 11.2g v2r5 DatabaseOracleDB

IDENTIFICATION AND AUTHENTICATION

OH12-1X-000244 - OHS must have the LoadModule ossl_module directive enabled to perform RFC 5280-compliant certification path validation.DISA STIG Oracle HTTP Server 12.1.3 v2r2Unix

IDENTIFICATION AND AUTHENTICATION

OH12-1X-000245 - OHS must use FIPS modules to perform RFC 5280-compliant certification path validation.DISA STIG Oracle HTTP Server 12.1.3 v2r2Unix

IDENTIFICATION AND AUTHENTICATION

OH12-1X-000246 - OHS must have the SSLEngine, SSLProtocol, and SSLWallet directives enabled and configured to perform RFC 5280-compliant certification path validation - SSLEngineDISA STIG Oracle HTTP Server 12.1.3 v2r2Unix

IDENTIFICATION AND AUTHENTICATION

OH12-1X-000246 - OHS must have the SSLEngine, SSLProtocol, and SSLWallet directives enabled and configured to perform RFC 5280-compliant certification path validation - SSLProtocolDISA STIG Oracle HTTP Server 12.1.3 v2r2Unix

IDENTIFICATION AND AUTHENTICATION

OH12-1X-000247 - OHS must have the SSLCipherSuite directive enabled to perform RFC 5280-compliant certification path validation.DISA STIG Oracle HTTP Server 12.1.3 v2r2Unix

IDENTIFICATION AND AUTHENTICATION

OH12-1X-000248 - OHS must have the SSLVerifyClient directive set within each SSL-enabled VirtualHost directive to perform RFC 5280-compliant certification path validation.DISA STIG Oracle HTTP Server 12.1.3 v2r2Unix

IDENTIFICATION AND AUTHENTICATION

PPS9-00-004500 - The EDB Postgres Advanced Server, when utilizing PKI-based authentication, must validate certificates by performing RFC 5280-compliant certification path validation.EDB PostgreSQL Advanced Server OS Linux Audit v2r3Unix

IDENTIFICATION AND AUTHENTICATION

PPS9-00-004600 - The EDB Postgres Advanced Server must enforce authorized access to all PKI private keys stored/utilized by the EDB Postgres Advanced Server.EDB PostgreSQL Advanced Server OS Linux Audit v2r3Unix

IDENTIFICATION AND AUTHENTICATION

SQL6-D0-008400 - SQL Server must enforce authorized access to all PKI private keys stored/utilized by SQL Server.DISA STIG SQL Server 2016 Instance OS Audit v3r1Windows

IDENTIFICATION AND AUTHENTICATION

WBLC-05-000172 - Oracle WebLogic, when utilizing PKI-based authentication, must validate certificates by constructing a certification path with status information to an accepted trust anchor - Secure Listen PortOracle WebLogic Server 12c Windows v2r1Windows

IDENTIFICATION AND AUTHENTICATION

WBLC-05-000174 - Oracle WebLogic must map the PKI-based authentication identity to the user account.Oracle WebLogic Server 12c Linux v2r1 MiddlewareUnix

IDENTIFICATION AND AUTHENTICATION

WBLC-05-000174 - Oracle WebLogic must map the PKI-based authentication identity to the user account.Oracle WebLogic Server 12c Linux v2r1Unix

IDENTIFICATION AND AUTHENTICATION

WDNS-IA-000008 - The Windows 2012 DNS Server permissions must be set so that the key file can only be read or modified by the account that runs the name server software.DISA Microsoft Windows 2012 Server DNS STIG v2r7Windows

IDENTIFICATION AND AUTHENTICATION

WDNS-IA-000009 - The private key corresponding to the ZSK must only be stored on the name server that does support dynamic updates.DISA Microsoft Windows 2012 Server DNS STIG v2r7Windows

IDENTIFICATION AND AUTHENTICATION

WN10-PK-000010 - The External Root CA certificates must be installed in the Trusted Root Store on unclassified systems.DISA Windows 10 STIG v3r2Windows

IDENTIFICATION AND AUTHENTICATION

WN12-SO-000092 - Users must be required to enter a password to access private keys stored on the computer.DISA Windows Server 2012 and 2012 R2 DC STIG v3r7Windows

IDENTIFICATION AND AUTHENTICATION

WN16-DC-000290 - Domain Controller PKI certificates must be issued by the DoD PKI or an approved External Certificate Authority (ECA).DISA Windows Server 2016 STIG v2r9Windows

IDENTIFICATION AND AUTHENTICATION

WN16-DC-000300 - PKI certificates associated with user accounts must be issued by the DoD PKI or an approved External Certificate Authority (ECA).DISA Windows Server 2016 STIG v2r9Windows

IDENTIFICATION AND AUTHENTICATION

WN19-DC-000300 - Windows Server 2019 PKI certificates associated with user accounts must be issued by a DoD PKI or an approved External Certificate Authority (ECA).DISA Windows Server 2019 STIG v3r2Windows

IDENTIFICATION AND AUTHENTICATION

WN19-SO-000350 - Windows Server 2019 users must be required to enter a password to access private keys stored on the computer.DISA Windows Server 2019 STIG v3r2Windows

IDENTIFICATION AND AUTHENTICATION

WN22-PK-000010 - Windows Server 2022 must have the DoD Root Certificate Authority (CA) certificates installed in the Trusted Root Store.DISA Windows Server 2022 STIG v2r2Windows

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

WN22-PK-000020 - Windows Server 2022 must have the DoD Interoperability Root Certificate Authority (CA) cross-certificates installed in the Untrusted Certificates Store on unclassified systems.DISA Windows Server 2022 STIG v2r2Windows

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

WN22-PK-000030 - Windows Server 2022 must have the US DoD CCEB Interoperability Root CA cross-certificates in the Untrusted Certificates Store on unclassified systems.DISA Windows Server 2022 STIG v2r2Windows

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION