ALMA-09-039840 - AlmaLinux OS 9 must have the crypto-policies package installed. | DISA CloudLinux AlmaLinux OS 9 STIG v1r2 | Unix | MAINTENANCE |
ALMA-09-040060 - AlmaLinux OS 9 must implement a systemwide encryption policy. | DISA CloudLinux AlmaLinux OS 9 STIG v1r2 | Unix | MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION |
AMLS-NM-000350 - Arista Multilayer Switches used for nonlocal maintenance sessions must implement cryptographic mechanisms to protect the confidentiality of nonlocal maintenance and diagnostic communications - api http | DISA STIG Arista MLS DCS-7000 Series NDM v1r4 | Arista | MAINTENANCE |
AMLS-NM-000350 - Arista Multilayer Switches used for nonlocal maintenance sessions must implement cryptographic mechanisms to protect the confidentiality of nonlocal maintenance and diagnostic communications - api https | DISA STIG Arista MLS DCS-7000 Series NDM v1r4 | Arista | MAINTENANCE |
AMLS-NM-000350 - Arista Multilayer Switches used for nonlocal maintenance sessions must implement cryptographic mechanisms to protect the confidentiality of nonlocal maintenance and diagnostic communications - telnet | DISA STIG Arista MLS DCS-7000 Series NDM v1r4 | Arista | MAINTENANCE |
APPL-12-000054 - The macOS system must implement approved ciphers within the SSH server configuration to protect the confidentiality of SSH connections. | DISA STIG Apple macOS 12 v1r9 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, MAINTENANCE |
APPL-12-000056 - The macOS system must implement approved Key Exchange Algorithms within the SSH server configuration. | DISA STIG Apple macOS 12 v1r9 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, MAINTENANCE |
ARST-ND-000700 - The Arista network device must be configured to implement cryptographic mechanisms using a FIPS 140-2 approved algorithm to protect the confidentiality of remote maintenance sessions. | DISA STIG Arista MLS EOS 4.2x NDM v2r1 | Arista | MAINTENANCE |
CASA-ND-001150 - The Cisco ASA must be configured to implement cryptographic mechanisms using a FIPS 140-2 approved algorithm to protect the confidentiality of remote maintenance sessions. | DISA STIG Cisco ASA NDM v2r2 | Cisco | MAINTENANCE |
CISC-ND-001210 - The Cisco router must be configured to implement cryptographic mechanisms to protect the confidentiality of remote maintenance sessions. | DISA Cisco IOS XE Router NDM STIG v3r4 | Cisco | MAINTENANCE |
CISC-ND-001210 - The Cisco router must be configured to implement cryptographic mechanisms to protect the confidentiality of remote maintenance sessions. | DISA Cisco IOS Router NDM STIG v3r4 | Cisco | MAINTENANCE |
CISC-ND-001210 - The Cisco router must be configured to implement cryptographic mechanisms to protect the confidentiality of remote maintenance sessions. | DISA Cisco IOS XR Router NDM STIG v3r3 | Cisco | MAINTENANCE |
CISC-ND-001210 - The Cisco switch must be configured to implement cryptographic mechanisms to protect the confidentiality of remote maintenance sessions. | DISA Cisco IOS XE Switch NDM STIG v3r4 | Cisco | MAINTENANCE |
CISC-ND-001210 - The Cisco switch must be configured to implement cryptographic mechanisms to protect the confidentiality of remote maintenance sessions. | DISA STIG Cisco IOS Switch NDM v3r2 | Cisco | MAINTENANCE |
CISC-ND-001210 - The Cisco switch must be configured to implement cryptographic mechanisms to protect the confidentiality of remote maintenance sessions. | DISA Cisco NX OS Switch NDM STIG v3r3 | Cisco | MAINTENANCE |
FGFW-ND-000265 - The FortiGate device must implement cryptographic mechanisms using a FIPS 140-2 approved algorithm to protect the confidentiality of remote maintenance sessions. | DISA Fortigate Firewall NDM STIG v1r4 | FortiGate | MAINTENANCE |
JUEX-NM-000520 - The Juniper EX switch must be configured to implement cryptographic mechanisms using a FIPS 140-2 approved algorithm to protect the confidentiality of remote maintenance sessions. | DISA Juniper EX Series Network Device Management v2r3 | Juniper | MAINTENANCE |
JUNI-ND-001200 - The Juniper router must be configured to implement cryptographic mechanisms to protect the confidentiality of remote maintenance sessions. | DISA STIG Juniper Router NDM v3r2 | Juniper | MAINTENANCE |
JUSX-DM-000149 - The Juniper SRX Services Gateway must securely configure SNMPv3 with privacy options to protect the confidentiality of nonlocal maintenance and diagnostic communications using SNMP. | DISA Juniper SRX Services Gateway NDM v3r3 | Juniper | MAINTENANCE |
JUSX-DM-000150 - The Juniper SRX Services Gateway must use SSHv2 with privacy options to protect the confidentiality of maintenance and diagnostic communications for nonlocal maintenance sessions using SSH. | DISA Juniper SRX Services Gateway NDM v3r3 | Juniper | MAINTENANCE |
JUSX-DM-000152 - For nonlocal maintenance sessions, the Juniper SRX Services Gateway must ensure only zones where management functionality is desired have host-inbound-traffic system-services configured. | DISA Juniper SRX Services Gateway NDM v3r3 | Juniper | MAINTENANCE |
Monterey - Configure SSHD to Use Secure Key Exchange Algorithms | NIST macOS Monterey v1.0.0 - All Profiles | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, MAINTENANCE |
OL09-00-000240 - OL 9 must have the crypto-policies package installed. | DISA Oracle Linux 9 STIG v1r2 | Unix | MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION |
OL09-00-000241 - OL 9 must implement a FIPS 140-3 compliant system-wide cryptographic policy. | DISA Oracle Linux 9 STIG v1r2 | Unix | MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION |
OL09-00-000242 - OL 9 must not allow the cryptographic policy to be overridden. | DISA Oracle Linux 9 STIG v1r2 | Unix | MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION |
PANW-NM-000118 - The Palo Alto Networks security platform must not use SNMP Versions 1 or 2. | DISA STIG Palo Alto NDM v3r3 | Palo_Alto | MAINTENANCE |
PHTN-30-000064 - The Photon operating system must configure sshd to use FIPS 140-2 ciphers. | DISA STIG VMware vSphere 7.0 Photon OS v1r4 | Unix | MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION |
PHTN-67-000067 - The Photon operating system must configure sshd to use FIPS 140-2 ciphers. | DISA STIG VMware vSphere 6.7 Photon OS v1r6 | Unix | MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION |
RHEL-09-215100 - RHEL 9 must have the crypto-policies package installed. | DISA Red Hat Enterprise Linux 9 STIG v2r4 | Unix | MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION |
RHEL-09-215105 - RHEL 9 must implement a FIPS 140-3 compliant systemwide cryptographic policy. | DISA Red Hat Enterprise Linux 9 STIG v2r4 | Unix | MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION |
RHEL-09-672020 - RHEL 9 cryptographic policy must not be overridden. | DISA Red Hat Enterprise Linux 9 STIG v2r4 | Unix | MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION |
SLES-15-010270 - The SUSE operating system SSH daemon must be configured to only use Message Authentication Codes (MACs) employing FIPS 140-2 approved cryptographic hash algorithms. | DISA SUSE Linux Enterprise Server 15 STIG v2r4 | Unix | ACCESS CONTROL, MAINTENANCE |
SYMP-NM-000290 - The Symantec ProxySG Web Management Console and SSH sessions must implement cryptographic mechanisms to protect the confidentiality of nonlocal maintenance and diagnostic communications. | DISA Symantec ProxySG Benchmark NDM v1r2 | BlueCoat | MAINTENANCE |
UBTU-16-030240 - The SSH daemon must be configured to only use Message Authentication Codes (MACs) employing FIPS 140-2 approved cryptographic hash algorithms. | DISA STIG Ubuntu 16.04 LTS v2r3 | Unix | ACCESS CONTROL, MAINTENANCE |
UBTU-20-010044 - The Ubuntu operating system must configure the SSH daemon to use FIPS 140-2 approved ciphers to prevent the unauthorized disclosure of information and/or detect changes to information during transmission. | DISA Canonical Ubuntu 20.04 LTS STIG v2r2 | Unix | ACCESS CONTROL, MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION |
UBTU-22-255050 - Ubuntu 22.04 LTS must configure the SSH daemon to use FIPS 140-3-approved ciphers to prevent the unauthorized disclosure of information and/or detect changes to information during transmission. | DISA Canonical Ubuntu 22.04 LTS STIG v2r5 | Unix | ACCESS CONTROL, MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION |
UBTU-24-100820 - Ubuntu 24.04 LTS must configure the SSH daemon to use FIPS 140-3 approved ciphers to prevent the unauthorized disclosure of information and/or detect changes to information during transmission. | DISA Canonical Ubuntu 24.04 LTS STIG v1r1 | Unix | ACCESS CONTROL, MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION |
WN10-CC-000335 - The Windows Remote Management (WinRM) client must not allow unencrypted traffic. | DISA Microsoft Windows 10 STIG v3r4 | Windows | MAINTENANCE |
WN10-CC-000350 - The Windows Remote Management (WinRM) service must not allow unencrypted traffic. | DISA Microsoft Windows 10 STIG v3r4 | Windows | MAINTENANCE |
WN11-CC-000350 - The Windows Remote Management (WinRM) service must not allow unencrypted traffic. | DISA Microsoft Windows 11 STIG v2r3 | Windows | MAINTENANCE |
WN12-CC-000124 - The Windows Remote Management (WinRM) client must not allow unencrypted traffic. | DISA Windows Server 2012 and 2012 R2 MS STIG v3r7 | Windows | MAINTENANCE |
WN12-CC-000124 - The Windows Remote Management (WinRM) client must not allow unencrypted traffic. | DISA Windows Server 2012 and 2012 R2 DC STIG v3r7 | Windows | MAINTENANCE |
WN12-CC-000127 - The Windows Remote Management (WinRM) service must not allow unencrypted traffic. | DISA Windows Server 2012 and 2012 R2 DC STIG v3r7 | Windows | MAINTENANCE |
WN12-CC-000127 - The Windows Remote Management (WinRM) service must not allow unencrypted traffic. | DISA Windows Server 2012 and 2012 R2 MS STIG v3r7 | Windows | MAINTENANCE |
WN16-CC-000510 - The Windows Remote Management (WinRM) client must not allow unencrypted traffic. | DISA Microsoft Windows Server 2016 STIG v2r10 | Windows | MAINTENANCE |
WN16-CC-000540 - The Windows Remote Management (WinRM) service must not allow unencrypted traffic. | DISA Microsoft Windows Server 2016 STIG v2r10 | Windows | MAINTENANCE |
WN19-CC-000480 - Windows Server 2019 Windows Remote Management (WinRM) client must not allow unencrypted traffic. | DISA Microsoft Windows Server 2019 STIG v3r4 | Windows | MAINTENANCE |
WN19-CC-000510 - Windows Server 2019 Windows Remote Management (WinRM) service must not allow unencrypted traffic. | DISA Microsoft Windows Server 2019 STIG v3r4 | Windows | MAINTENANCE |
WN22-CC-000480 - Windows Server 2022 Windows Remote Management (WinRM) client must not allow unencrypted traffic. | DISA Microsoft Windows Server 2022 STIG v2r4 | Windows | MAINTENANCE |
WN22-CC-000510 - Windows Server 2022 Windows Remote Management (WinRM) service must not allow unencrypted traffic. | DISA Microsoft Windows Server 2022 STIG v2r4 | Windows | MAINTENANCE |