Item Search

NameAudit NamePluginCategory
APPNET0060 - Remoting Services HTTP channels must utilize authentication and encryption.DISA Microsoft DotNet Framework 4.0 STIG v2r7Windows

SYSTEM AND COMMUNICATIONS PROTECTION

APPNET0071 - Remoting Services TCP channels must utilize authentication and encryption.DISA Microsoft DotNet Framework 4.0 STIG v2r7Windows

SYSTEM AND COMMUNICATIONS PROTECTION

CASA-VN-000240 - The Cisco ASA must be configured to use FIPS-validated SHA-2 or higher for Internet Key Exchange (IKE) Phase 2.DISA STIG Cisco ASA VPN v2r2Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CNTR-K8-001400 - The Kubernetes API server must use approved cipher suites.DISA STIG Kubernetes v2r5Unix

SYSTEM AND COMMUNICATIONS PROTECTION

CNTR-K8-001410 - Kubernetes API Server must have the SSL Certificate Authority set.DISA STIG Kubernetes v2r5Unix

SYSTEM AND COMMUNICATIONS PROTECTION

CNTR-K8-001420 - Kubernetes Kubelet must have the SSL Certificate Authority set.DISA STIG Kubernetes v2r5Unix

SYSTEM AND COMMUNICATIONS PROTECTION

CNTR-K8-001430 - Kubernetes Controller Manager must have the SSL Certificate Authority set.DISA STIG Kubernetes v2r5Unix

SYSTEM AND COMMUNICATIONS PROTECTION

CNTR-K8-001440 - Kubernetes API Server must have a certificate for communication.DISA STIG Kubernetes v2r5Unix

SYSTEM AND COMMUNICATIONS PROTECTION

CNTR-K8-001450 - Kubernetes etcd must enable client authentication to secure service.DISA STIG Kubernetes v2r5Unix

SYSTEM AND COMMUNICATIONS PROTECTION

CNTR-K8-001460 - Kubernetes Kubelet must enable tlsPrivateKeyFile for client authentication to secure service.DISA STIG Kubernetes v2r5Unix

SYSTEM AND COMMUNICATIONS PROTECTION

CNTR-K8-001470 - Kubernetes Kubelet must enable tlsCertFile for client authentication to secure service.DISA STIG Kubernetes v2r5Unix

SYSTEM AND COMMUNICATIONS PROTECTION

CNTR-K8-001480 - Kubernetes etcd must enable client authentication to secure service.DISA STIG Kubernetes v2r5Unix

SYSTEM AND COMMUNICATIONS PROTECTION

CNTR-K8-001490 - Kubernetes etcd must have a key file for secure communication.DISA STIG Kubernetes v2r5Unix

SYSTEM AND COMMUNICATIONS PROTECTION

CNTR-K8-001500 - Kubernetes etcd must have a certificate for communication.DISA STIG Kubernetes v2r5Unix

SYSTEM AND COMMUNICATIONS PROTECTION

CNTR-K8-001510 - Kubernetes etcd must have the SSL Certificate Authority set.DISA STIG Kubernetes v2r5Unix

SYSTEM AND COMMUNICATIONS PROTECTION

CNTR-K8-001520 - Kubernetes etcd must have a certificate for communication.DISA STIG Kubernetes v2r5Unix

SYSTEM AND COMMUNICATIONS PROTECTION

CNTR-K8-001530 - Kubernetes etcd must have a key file for secure communication.DISA STIG Kubernetes v2r5Unix

SYSTEM AND COMMUNICATIONS PROTECTION

CNTR-K8-001540 - Kubernetes etcd must have peer-cert-file set for secure communication.DISA STIG Kubernetes v2r5Unix

SYSTEM AND COMMUNICATIONS PROTECTION

CNTR-K8-001550 - Kubernetes etcd must have a peer-key-file set for secure communication.DISA STIG Kubernetes v2r5Unix

SYSTEM AND COMMUNICATIONS PROTECTION

DTBI046-IE11 - Logon options must be configured to prompt (Internet zone).DISA STIG IE 11 v2r6Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTBI136-IE11 - Logon options must be configured and enforced (Restricted Sites zone).DISA STIG IE 11 v2r6Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO421 - Session Initiation Protocol (SIP) security mode must be configured.DISA STIG Microsoft Lync 2013 v1r5Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO421 - Session Initiation Protocol (SIP) security mode must be configured.DISA STIG Microsoft Skype for Business 2016 v2r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO422 - In the event a secure Session Initiation Protocol (SIP) connection fails, the connection must be restricted from resorting to the unencrypted HTTP.DISA STIG Microsoft Lync 2013 v1r5Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO422 - In the event a secure Session Initiation Protocol (SIP) connection fails, the connection must be restricted from resorting to the unencrypted HTTP.DISA STIG Microsoft Skype for Business 2016 v2r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

EX13-MB-000120 - Exchange internal Send connectors must require encryption.DISA Microsoft Exchange 2013 Mailbox Server STIG v2r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

EX16-ED-000170 - Exchange internal Send connectors must use domain security (mutual authentication Transport Layer Security) - mutual authentication Transport Layer SecurityDISA Microsoft Exchange 2016 Edge Transport Server STIG v2r6Windows

SYSTEM AND COMMUNICATIONS PROTECTION

EX16-MB-000220 - Exchange internal Receive connectors must require encryption.DISA Microsoft Exchange 2016 Mailbox Server STIG v2r6Windows

SYSTEM AND COMMUNICATIONS PROTECTION

EX19-ED-000098 - Exchange internal send connectors must use domain security (mutual authentication Transport Layer Security).DISA Microsoft Exchange 2019 Edge Server STIG v2r2Windows

SYSTEM AND COMMUNICATIONS PROTECTION

EX19-ED-000099 - Exchange internet-facing receive connectors must offer Transport Layer Security (TLS) before using basic authentication.DISA Microsoft Exchange 2019 Edge Server STIG v2r2Windows

SYSTEM AND COMMUNICATIONS PROTECTION

EX19-MB-000236 - The application must protect the confidentiality and integrity of transmitted information.DISA Microsoft Exchange 2019 Mailbox Server STIG v2r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

F5BI-AP-000234 - The F5 BIG-IP appliance must not use the On-Demand Cert Auth VPE agent as part of the APM Policy Profiles.DISA F5 BIG-IP Access Policy Manager STIG v2r4F5

SYSTEM AND COMMUNICATIONS PROTECTION

F5BI-AP-000236 - The F5 BIG-IP appliance must be configured to limit authenticated client sessions to initial session source IP.DISA F5 BIG-IP Access Policy Manager STIG v2r4F5

SYSTEM AND COMMUNICATIONS PROTECTION

F5BI-AP-300155 - The F5 BIG-IP appliance must not use the On-demand Cert Auth VPE agent as part of the APM Policy Profiles.DISA F5 BIG-IP TMOS ALG STIG v1r2F5

SYSTEM AND COMMUNICATIONS PROTECTION

F5BI-AP-300156 - The F5 BIG-IP appliance must be configured to restrict a consistent inbound IP for the entire management session.DISA F5 BIG-IP TMOS ALG STIG v1r2F5

SYSTEM AND COMMUNICATIONS PROTECTION

F5BI-AP-300157 - The F5 BIG-IP appliance must be configured to limit authenticated client sessions to initial session source IP.DISA F5 BIG-IP TMOS ALG STIG v1r2F5

SYSTEM AND COMMUNICATIONS PROTECTION

F5BI-AP-300163 - The VPN Gateway must use Always On VPN connections for remote computing.DISA F5 BIG-IP TMOS ALG STIG v1r2F5

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

F5BI-DN-300036 - The F5 BIG-IP DNS implementation must protect the authenticity of communications sessions for zone transfers.DISA F5 BIG-IP TMOS DNS STIG v1r1F5

SYSTEM AND COMMUNICATIONS PROTECTION

F5BI-VN-300041 - The F5 BIG-IP appliance IPsec VPN must be configured to use FIPS-validated SHA-2 or higher for Internet Key Exchange (IKE).DISA F5 BIG-IP TMOS VPN STIG v1r1F5

SYSTEM AND COMMUNICATIONS PROTECTION

JUSX-VN-000025 - The Juniper SRX Services Gateway VPN must configure Internet Key Exchange (IKE) with SHA1 or greater to protect the authenticity of communications sessions.DISA Juniper SRX Services Gateway VPN v3r2Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

O365-LY-000002 - The HTTP fallback for SIP connection in Lync must be disabled.DISA STIG Microsoft Office 365 ProPlus v3r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

OS10-RTR-000540 - The Dell OS10 Router must be configured to implement message authentication for all control plane protocols.DISA Dell OS10 Switch Router STIG v1r1Dell_OS10

SYSTEM AND COMMUNICATIONS PROTECTION

OS10-RTR-000550 - The Dell OS10 BGP router must be configured to use a unique key for each autonomous system (AS) that it peers with.DISA Dell OS10 Switch Router STIG v1r1Dell_OS10

SYSTEM AND COMMUNICATIONS PROTECTION

OS10-RTR-000560 - The Dell OS10 Router must be configured to use keys with a duration not exceeding 180 days for authenticating routing protocol messages.DISA Dell OS10 Switch Router STIG v1r1Dell_OS10

SYSTEM AND COMMUNICATIONS PROTECTION

SYMP-AG-000490 - Symantec ProxySG must use Transport Layer Security (TLS) to protect the authenticity of communications sessions.DISA Symantec ProxySG Benchmark ALG v1r3BlueCoat

SYSTEM AND COMMUNICATIONS PROTECTION

TCAT-AS-000800 - Tomcat servers must mutually authenticate proxy or load balancer connections.DISA STIG Apache Tomcat Application Server 9 v3r3 MiddlewareUnix

SYSTEM AND COMMUNICATIONS PROTECTION

WBSP-AS-001410 - The WebSphere Application Server DoD root CAs must be in the trust store.DISA IBM WebSphere Traditional 9 Windows STIG v1r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WBSP-AS-001410 - The WebSphere Application Server DoD root CAs must be in the trust store.DISA IBM WebSphere Traditional 9 STIG v1r1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

WBSP-AS-001410 - The WebSphere Application Server DoD root CAs must be in the trust store.DISA IBM WebSphere Traditional 9 STIG v1r1 MiddlewareUnix

SYSTEM AND COMMUNICATIONS PROTECTION

WDNS-SC-000020 - The Windows 2012 DNS Server must protect the authenticity of dynamic updates via transaction signing.DISA Microsoft Windows 2012 Server Domain Name System STIG v2r7Windows

SYSTEM AND COMMUNICATIONS PROTECTION