| 1.67 RHEL-09-215100 | CIS Red Hat Enterprise Linux 9 STIG v1.0.0 CAT II | Unix | MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION |
| 1.69 RHEL-09-215105 | CIS Red Hat Enterprise Linux 9 STIG v1.0.0 CAT II | Unix | MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION |
| 1.141 WN22-CC-000480 | CIS Microsoft Windows Server 2022 STIG v3.0.0 DC CAT II | Windows | MAINTENANCE |
| 1.141 WN22-CC-000480 | CIS Microsoft Windows Server 2022 STIG v3.0.0 MS CAT II | Windows | MAINTENANCE |
| 1.144 WN22-CC-000510 | CIS Microsoft Windows Server 2022 STIG v3.0.0 DC CAT II | Windows | MAINTENANCE |
| 1.144 WN22-CC-000510 | CIS Microsoft Windows Server 2022 STIG v3.0.0 MS CAT II | Windows | MAINTENANCE |
| 1.160 WN10-CC-000290 | CIS Microsoft Windows 10 STIG v1.0.0 CAT II | Windows | ACCESS CONTROL, MAINTENANCE |
| 1.171 WN10-CC-000335 | CIS Microsoft Windows 10 STIG v1.0.0 CAT II | Windows | MAINTENANCE |
| 1.173 WN10-CC-000350 | CIS Microsoft Windows 10 STIG v1.0.0 CAT II | Windows | MAINTENANCE |
| 1.450 RHEL-09-672020 | CIS Red Hat Enterprise Linux 9 STIG v1.0.0 CAT I | Unix | MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION |
| 5.043 - Terminal Services is not configured with the client connection encryption set to the required level. | DISA Windows Vista STIG v6r41 | Windows | ACCESS CONTROL, MAINTENANCE |
| ALMA-09-039840 - AlmaLinux OS 9 must have the crypto-policies package installed. | DISA Cloud Linux AlmaLinux OS 9 STIG v1r5 | Unix | MAINTENANCE |
| AMLS-NM-000340 - Arista Multilayer Switches used for nonlocal maintenance sessions must implement cryptographic mechanisms to protect the integrity of nonlocal maintenance and diagnostic communications - api http | DISA STIG Arista MLS DCS-7000 Series NDM v1r4 | Arista | MAINTENANCE |
| AMLS-NM-000340 - Arista Multilayer Switches used for nonlocal maintenance sessions must implement cryptographic mechanisms to protect the integrity of nonlocal maintenance and diagnostic communications - api https | DISA STIG Arista MLS DCS-7000 Series NDM v1r4 | Arista | MAINTENANCE |
| AMLS-NM-000340 - Arista Multilayer Switches used for nonlocal maintenance sessions must implement cryptographic mechanisms to protect the integrity of nonlocal maintenance and diagnostic communications - telnet | DISA STIG Arista MLS DCS-7000 Series NDM v1r4 | Arista | MAINTENANCE |
| ARST-ND-000690 - The Arista network devices must use FIPS-validated Keyed-Hash Message Authentication Code (HMAC) to protect the integrity of remote maintenance sessions. | DISA Arista MLS EOS 4.X NDM STIG v2r2 | Arista | IDENTIFICATION AND AUTHENTICATION, MAINTENANCE |
| ARST-ND-000690 - The Arista network devices must use FIPS-validated Keyed-Hash Message Authentication Code (HMAC) to protect the integrity of remote maintenance sessions. | DISA STIG Arista MLS EOS 4.2x NDM v2r1 | Arista | IDENTIFICATION AND AUTHENTICATION, MAINTENANCE |
| CASA-ND-001140 - The Cisco ASA must be configured to use FIPS-validated Keyed-Hash Message Authentication Code (HMAC) to protect the integrity of non-local maintenance and diagnostic communications. | DISA STIG Cisco ASA NDM v2r4 | Cisco | MAINTENANCE |
| CISC-ND-001200 - The Cisco router must be configured to use FIPS-validated Keyed-Hash Message Authentication Code (HMAC) to protect the integrity of remote maintenance sessions. | DISA Cisco IOS XR Router NDM STIG v3r5 | Cisco | MAINTENANCE |
| CISC-ND-001200 - The Cisco switch must be configured to use FIPS-validated Keyed-Hash Message Authentication Code (HMAC) to protect the integrity of remote maintenance sessions. | DISA Cisco NX OS Switch NDM STIG v3r6 | Cisco | MAINTENANCE |
| FGFW-ND-000260 - The FortiGate devices must use FIPS-validated Keyed-Hash Message Authentication Code (HMAC) to protect the integrity of nonlocal maintenance and diagnostic communications. | DISA Fortigate Firewall NDM STIG v1r4 | FortiGate | MAINTENANCE |
| JUEX-NM-000510 - The Juniper EX switches must be configured to use FIPS-validated Keyed-Hash Message Authentication Code (HMAC) to protect the integrity of nonlocal maintenance and diagnostic communications. | DISA Juniper EX Series Network Device Management v2r4 | Juniper | MAINTENANCE |
| JUNI-ND-001190 - The Juniper router must be configured to use FIPS-validated Keyed-Hash Message Authentication Code (HMAC) to protect the integrity of remote maintenance sessions. | DISA STIG Juniper Router NDM v3r2 | Juniper | MAINTENANCE |
| JUSX-DM-000146 - For nonlocal maintenance sessions using SNMP, the Juniper SRX Services Gateway must use and securely configure SNMPv3 with SHA256 or higher to protect the integrity of maintenance and diagnostic communications. | DISA Juniper SRX Services Gateway NDM v3r3 | Juniper | MAINTENANCE |
| JUSX-DM-000147 - The Juniper SRX Services Gateway must securely configure SSHv2 FIPS 140-2/140-3 validated Keyed-Hash Message Authentication Code (HMAC) to protect the integrity of maintenance and diagnostic communications for nonlocal maintenance sessions - MAC algorithms to protect the integrity of maintenance and diagnostic communications. | DISA Juniper SRX Services Gateway NDM v3r3 | Juniper | MAINTENANCE |
| OL09-00-000240 - OL 9 must have the crypto-policies package installed. | DISA Oracle Linux 9 STIG v1r4 | Unix | MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION |
| OL09-00-000241 - OL 9 must implement a FIPS 140-3 compliant system-wide cryptographic policy. | DISA Oracle Linux 9 STIG v1r4 | Unix | MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION |
| OL09-00-000242 - OL 9 must not allow the cryptographic policy to be overridden. | DISA Oracle Linux 9 STIG v1r4 | Unix | MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION |
| OS10-NDM-000780 - The Dell OS10 Switch must use FIPS-validated Keyed-Hash Message Authentication Code (HMAC) to protect the integrity of nonlocal maintenance and diagnostic communications. | DISA Dell OS10 Switch NDM STIG v1r1 | Dell_OS10 | MAINTENANCE |
| PANW-NM-000117 - The Palo Alto Networks security platform must only allow the use of secure protocols that implement cryptographic mechanisms to protect the integrity of maintenance and diagnostic communications for nonlocal maintenance sessions. | DISA Palo Alto Networks NDM STIG v3r3 | Palo_Alto | MAINTENANCE |
| RHEL-09-215100 - RHEL 9 must have the crypto-policies package installed. | DISA Red Hat Enterprise Linux 9 STIG v2r8 | Unix | MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION |
| RHEL-09-215105 - RHEL 9 must implement a FIPS 140-3-compliant systemwide cryptographic policy. | DISA Red Hat Enterprise Linux 9 STIG v2r8 | Unix | MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION |
| RHEL-09-672020 - RHEL 9 cryptographic policy must not be overridden. | DISA Red Hat Enterprise Linux 9 STIG v2r8 | Unix | MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION |
| RHEL-10-300000 - RHEL 10 must have the "crypto-policies" package installed. | DISA Red Hat Enterprise Linux 10 STIG v1r1 | Unix | MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION |
| RHEL-10-300090 - RHEL 10 cryptographic policy must not be overridden. | DISA Red Hat Enterprise Linux 10 STIG v1r1 | Unix | MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION |
| SYMP-NM-000300 - The Symantec ProxySG must use FIPS-validated Keyed-Hash Message Authentication Code (HMAC) to protect the integrity of nonlocal maintenance and diagnostic communications. | DISA Symantec ProxySG Benchmark NDM v1r2 | BlueCoat | MAINTENANCE |
| WN10-CC-000335 - The Windows Remote Management (WinRM) client must not allow unencrypted traffic. | DISA Microsoft Windows 10 STIG v3r6 | Windows | MAINTENANCE |
| WN10-CC-000350 - The Windows Remote Management (WinRM) service must not allow unencrypted traffic. | DISA Microsoft Windows 10 STIG v3r6 | Windows | MAINTENANCE |
| WN11-CC-000335 - The Windows Remote Management (WinRM) client must not allow unencrypted traffic. | DISA Microsoft Windows 11 STIG v2r7 | Windows | MAINTENANCE |
| WN12-CC-000124 - The Windows Remote Management (WinRM) client must not allow unencrypted traffic. | DISA Windows Server 2012 and 2012 R2 MS STIG v3r7 | Windows | MAINTENANCE |
| WN12-CC-000124 - The Windows Remote Management (WinRM) client must not allow unencrypted traffic. | DISA Windows Server 2012 and 2012 R2 DC STIG v3r7 | Windows | MAINTENANCE |
| WN12-CC-000127 - The Windows Remote Management (WinRM) service must not allow unencrypted traffic. | DISA Windows Server 2012 and 2012 R2 DC STIG v3r7 | Windows | MAINTENANCE |
| WN16-CC-000510 - The Windows Remote Management (WinRM) client must not allow unencrypted traffic. | DISA Microsoft Windows Server 2016 STIG v2r10 | Windows | MAINTENANCE |
| WN16-CC-000540 - The Windows Remote Management (WinRM) service must not allow unencrypted traffic. | DISA Microsoft Windows Server 2016 STIG v2r10 | Windows | MAINTENANCE |
| WN19-CC-000480 - Windows Server 2019 Windows Remote Management (WinRM) client must not allow unencrypted traffic. | DISA Microsoft Windows Server 2019 STIG v3r7 | Windows | MAINTENANCE |
| WN19-CC-000510 - Windows Server 2019 Windows Remote Management (WinRM) service must not allow unencrypted traffic. | DISA Microsoft Windows Server 2019 STIG v3r7 | Windows | MAINTENANCE |
| WN22-CC-000480 - Windows Server 2022 Windows Remote Management (WinRM) client must not allow unencrypted traffic. | DISA Microsoft Windows Server 2022 STIG v2r8 | Windows | MAINTENANCE |
| WN22-CC-000510 - Windows Server 2022 Windows Remote Management (WinRM) service must not allow unencrypted traffic. | DISA Microsoft Windows Server 2022 STIG v2r8 | Windows | MAINTENANCE |
| WN25-CC-000480 - Windows Server 2025 Windows Remote Management (WinRM) client must not allow unencrypted traffic. | DISA Microsoft Windows Server 2025 STIG v1r1 | Windows | MAINTENANCE |
| WN25-CC-000510 - Windows Server 2025 Windows Remote Management (WinRM) service must not allow unencrypted traffic. | DISA Microsoft Windows Server 2025 STIG v1r1 | Windows | MAINTENANCE |