AIX7-00-001102 - AIX must employ strong authenticators in the establishment of nonlocal maintenance and diagnostic sessions. | DISA STIG AIX 7.x v2r9 | Unix | MAINTENANCE |
AOSX-13-000054 - The macOS system must implement approved Ciphers to protect the confidentiality of SSH connections. | DISA STIG Apple Mac OSX 10.13 v2r5 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, MAINTENANCE |
AOSX-13-000055 - The macOS system must use only Message Authentication Codes (MACs) employing FIPS 140-2 validated cryptographic hash algorithms. | DISA STIG Apple Mac OSX 10.13 v2r5 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, MAINTENANCE |
AOSX-13-000056 - The macOS system must implement an approved Key Exchange Algorithm. | DISA STIG Apple Mac OSX 10.13 v2r5 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, MAINTENANCE |
AOSX-14-000054 - The macOS system must implement approved Ciphers to protect the confidentiality of SSH connections. | DISA STIG Apple Mac OSX 10.14 v2r6 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, MAINTENANCE |
AOSX-14-000055 - The macOS system must use only Message Authentication Codes (MACs) employing FIPS 140-2 validated cryptographic hash algorithms. | DISA STIG Apple Mac OSX 10.14 v2r6 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, MAINTENANCE |
AOSX-14-000056 - The macOS system must implement an approved Key Exchange Algorithm. | DISA STIG Apple Mac OSX 10.14 v2r6 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, MAINTENANCE |
AOSX-14-003024 - The macOS system must use multifactor authentication in the establishment of nonlocal maintenance and diagnostic sessions - ChallengeResponseAuthentication | DISA STIG Apple Mac OSX 10.14 v2r6 | Unix | MAINTENANCE |
AOSX-14-003024 - The macOS system must use multifactor authentication in the establishment of nonlocal maintenance and diagnostic sessions - enforceSmartCard | DISA STIG Apple Mac OSX 10.14 v2r6 | Unix | MAINTENANCE |
AOSX-14-003024 - The macOS system must use multifactor authentication in the establishment of nonlocal maintenance and diagnostic sessions - PasswordAuthentication | DISA STIG Apple Mac OSX 10.14 v2r6 | Unix | MAINTENANCE |
AOSX-15-000054 - The macOS system must implement approved Ciphers to protect the confidentiality of SSH connections.. | DISA STIG Apple Mac OSX 10.15 v1r10 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, MAINTENANCE |
AOSX-15-000055 - The macOS system must use only Message Authentication Codes (MACs) employing FIPS 140-2 validated cryptographic hash algorithms. | DISA STIG Apple Mac OSX 10.15 v1r10 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, MAINTENANCE |
AOSX-15-000056 - The macOS system must implement an approved Key Exchange Algorithm. | DISA STIG Apple Mac OSX 10.15 v1r10 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, MAINTENANCE |
APPL-13-000059 - The macOS system must implement approved Key Exchange Algorithms within the SSH client configuration. | DISA STIG Apple macOS 13 v1r4 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, MAINTENANCE |
OL08-00-010290 - The OL 8 SSH server must be configured to use only Message Authentication Codes (MACs) employing FIPS 140-2 validated cryptographic hash algorithms. | DISA Oracle Linux 8 STIG v2r1 | Unix | MAINTENANCE |
OL08-00-010291 - The OL 8 SSH server must be configured to use only ciphers employing FIPS 140-2 validated cryptographic algorithms. | DISA Oracle Linux 8 STIG v2r1 | Unix | MAINTENANCE |
RHEL-09-255050 - RHEL 9 must enable the Pluggable Authentication Module (PAM) interface for SSHD. | DISA Red Hat Enterprise Linux 9 STIG v2r2 | Unix | MAINTENANCE |
RHEL-09-671010 - RHEL 9 must enable FIPS mode. | DISA Red Hat Enterprise Linux 9 STIG v2r2 | Unix | ACCESS CONTROL, MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION |
SLES-12-030180 - The SUSE operating system SSH daemon must be configured to only use Message Authentication Codes (MACs) employing FIPS 140-2 approved cryptographic hash algorithms. | DISA SLES 12 STIG v2r13 | Unix | ACCESS CONTROL, MAINTENANCE |
SLES-15-010270 - The SUSE operating system SSH daemon must be configured to only use Message Authentication Codes (MACs) employing FIPS 140-2 approved cryptographic hash algorithms. | DISA SLES 15 STIG v2r1 | Unix | ACCESS CONTROL, MAINTENANCE |
UBTU-18-010414 - The Ubuntu operating system must use strong authenticators in establishing nonlocal maintenance and diagnostic sessions. | DISA STIG Ubuntu 18.04 LTS v2r15 | Unix | MAINTENANCE |
UBTU-20-010035 - The Ubuntu operating system must use strong authenticators in establishing nonlocal maintenance and diagnostic sessions. | DISA STIG Ubuntu 20.04 LTS v2r1 | Unix | MAINTENANCE |
UBTU-22-255065 - Ubuntu 22.04 LTS must use strong authenticators in establishing nonlocal maintenance and diagnostic sessions. | DISA STIG Canonical Ubuntu 22.04 LTS v2r2 | Unix | MAINTENANCE |
WBLC-06-000191 - Oracle WebLogic must employ strong identification and authentication techniques when establishing nonlocal maintenance and diagnostic sessions - Listen Port | Oracle WebLogic Server 12c Linux v2r1 | Unix | MAINTENANCE |
WBLC-06-000191 - Oracle WebLogic must employ strong identification and authentication techniques when establishing nonlocal maintenance and diagnostic sessions - Listen Port | Oracle WebLogic Server 12c Linux v2r1 Middleware | Unix | MAINTENANCE |
WBLC-06-000191 - Oracle WebLogic must employ strong identification and authentication techniques when establishing nonlocal maintenance and diagnostic sessions - Listen Port | Oracle WebLogic Server 12c Windows v2r1 | Windows | MAINTENANCE |
WBLC-06-000191 - Oracle WebLogic must employ strong identification and authentication techniques when establishing nonlocal maintenance and diagnostic sessions - SSL Listen Port | Oracle WebLogic Server 12c Linux v2r1 | Unix | MAINTENANCE |
WBLC-06-000191 - Oracle WebLogic must employ strong identification and authentication techniques when establishing nonlocal maintenance and diagnostic sessions - SSL Listen Port | Oracle WebLogic Server 12c Linux v2r1 Middleware | Unix | MAINTENANCE |
WBLC-06-000191 - Oracle WebLogic must employ strong identification and authentication techniques when establishing nonlocal maintenance and diagnostic sessions - SSL Listen Port | Oracle WebLogic Server 12c Windows v2r1 | Windows | MAINTENANCE |
WN10-CC-000330 - The Windows Remote Management (WinRM) client must not use Basic authentication. | DISA Windows 10 STIG v3r2 | Windows | MAINTENANCE |
WN10-CC-000345 - The Windows Remote Management (WinRM) service must not use Basic authentication. | DISA Windows 10 STIG v3r2 | Windows | MAINTENANCE |
WN10-CC-000360 - The Windows Remote Management (WinRM) client must not use Digest authentication. | DISA Windows 10 STIG v3r2 | Windows | MAINTENANCE |
WN11-CC-000330 - The Windows Remote Management (WinRM) client must not use Basic authentication. | DISA Windows 11 STIG v2r2 | Windows | MAINTENANCE |
WN11-CC-000345 - The Windows Remote Management (WinRM) service must not use Basic authentication. | DISA Windows 11 STIG v2r2 | Windows | MAINTENANCE |
WN11-CC-000360 - The Windows Remote Management (WinRM) client must not use Digest authentication. | DISA Windows 11 STIG v2r2 | Windows | MAINTENANCE |
WN12-CC-000123 - The Windows Remote Management (WinRM) client must not use Basic authentication. | DISA Windows Server 2012 and 2012 R2 MS STIG v3r7 | Windows | MAINTENANCE |
WN12-CC-000123 - The Windows Remote Management (WinRM) client must not use Basic authentication. | DISA Windows Server 2012 and 2012 R2 DC STIG v3r7 | Windows | MAINTENANCE |
WN12-CC-000125 - The Windows Remote Management (WinRM) client must not use Digest authentication. | DISA Windows Server 2012 and 2012 R2 DC STIG v3r7 | Windows | MAINTENANCE |
WN12-CC-000125 - The Windows Remote Management (WinRM) client must not use Digest authentication. | DISA Windows Server 2012 and 2012 R2 MS STIG v3r7 | Windows | MAINTENANCE |
WN12-CC-000126 - The Windows Remote Management (WinRM) service must not use Basic authentication. | DISA Windows Server 2012 and 2012 R2 MS STIG v3r7 | Windows | MAINTENANCE |
WN12-CC-000126 - The Windows Remote Management (WinRM) service must not use Basic authentication. | DISA Windows Server 2012 and 2012 R2 DC STIG v3r7 | Windows | MAINTENANCE |
WN16-CC-000500 - The Windows Remote Management (WinRM) client must not use Basic authentication. | DISA Windows Server 2016 STIG v2r9 | Windows | MAINTENANCE |
WN16-CC-000520 - The Windows Remote Management (WinRM) client must not use Digest authentication. | DISA Windows Server 2016 STIG v2r9 | Windows | MAINTENANCE |
WN16-CC-000530 - The Windows Remote Management (WinRM) service must not use Basic authentication. | DISA Windows Server 2016 STIG v2r9 | Windows | MAINTENANCE |
WN19-CC-000470 - Windows Server 2019 Windows Remote Management (WinRM) client must not use Basic authentication. | DISA Windows Server 2019 STIG v3r2 | Windows | MAINTENANCE |
WN19-CC-000490 - Windows Server 2019 Windows Remote Management (WinRM) client must not use Digest authentication. | DISA Windows Server 2019 STIG v3r2 | Windows | MAINTENANCE |
WN19-CC-000500 - Windows Server 2019 Windows Remote Management (WinRM) service must not use Basic authentication. | DISA Windows Server 2019 STIG v3r2 | Windows | MAINTENANCE |
WN22-CC-000470 - Windows Server 2022 Windows Remote Management (WinRM) client must not use Basic authentication. | DISA Windows Server 2022 STIG v2r2 | Windows | MAINTENANCE |
WN22-CC-000490 - Windows Server 2022 Windows Remote Management (WinRM) client must not use Digest authentication. | DISA Windows Server 2022 STIG v2r2 | Windows | MAINTENANCE |
WN22-CC-000500 - Windows Server 2022 Windows Remote Management (WinRM) service must not use Basic authentication. | DISA Windows Server 2022 STIG v2r2 | Windows | MAINTENANCE |