CCI|CCI-000778

Title

The information system uniquely identifies an organization-defined list of specific and/or types of devices before establishing a local, remote, or network connection.

Reference Item Details

Category: 2009

Audit Items

View all Reference Audit Items

NamePluginAudit Name
1.1.27 Disable AutomountingUnixCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
1.1.28 Disable USB Storage - /bin/trueUnixCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
1.1.28 Disable USB Storage - blacklistUnixCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
1.8.18 Ensure graphical user interface automounter is disabled - automountUnixCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
1.8.18 Ensure graphical user interface automounter is disabled - automount-openUnixCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
1.8.18 Ensure graphical user interface automounter is disabled - automount-open=falseUnixCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
1.8.18 Ensure graphical user interface automounter is disabled - automount=falseUnixCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
1.8.18 Ensure graphical user interface automounter is disabled - autorun-neverUnixCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
1.8.18 Ensure graphical user interface automounter is disabled - autorun-never=trueUnixCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
3.151 - Services using Local System that use Negotiate when reverting to NTLM authentication must use the computer identity vs. authenticating anonymously.WindowsDISA Windows 7 STIG v1r32
3.151 - Services using Local System that use negotiate when reverting to NTLM authentication will use the computer identity vs. authenticating anonymously.WindowsDISA Windows Server 2008 R2 DC STIG v1r34
3.151 - Services using Local System that use negotiate when reverting to NTLM authentication will use the computer identity vs. authenticating anonymously.WindowsDISA Windows Server 2008 R2 MS STIG v1r33
AIX7-00-001025 - AIX must configure the ttys value for all interactive usersUnixDISA STIG AIX 7.x v2r8
AIX7-00-001025 - AIX must configure the ttys value for all interactive users - ALL usersUnixDISA STIG AIX 7.x v2r1
AIX7-00-001025 - AIX must configure the ttys value for all interactive users - ALL usersUnixDISA STIG AIX 7.x v2r3
AIX7-00-001025 - AIX must configure the ttys value for all interactive users - ALL usersUnixDISA STIG AIX 7.x v2r6
AIX7-00-001025 - AIX must configure the ttys value for all interactive users - ALL usersUnixDISA STIG AIX 7.x v2r5
AIX7-00-001025 - AIX must configure the ttys value for all interactive users - default userUnixDISA STIG AIX 7.x v2r1
AIX7-00-001025 - AIX must configure the ttys value for all interactive users - default userUnixDISA STIG AIX 7.x v2r3
AIX7-00-001025 - AIX must configure the ttys value for all interactive users - default userUnixDISA STIG AIX 7.x v2r5
AIX7-00-001025 - AIX must configure the ttys value for all interactive users - default userUnixDISA STIG AIX 7.x v2r6
AIX7-00-001025 - AIX must configure the ttys value for all interactive users.UnixDISA STIG AIX 7.x v2r9
AMLS-L2-000120 - The Arista Multilayer Switch must uniquely identify all network-connected endpoint devices before establishing any connection - aaa auth dot1x default groupAristaDISA STIG Arista MLS DCS-7000 Series L2S v1r2
AMLS-L2-000120 - The Arista Multilayer Switch must uniquely identify all network-connected endpoint devices before establishing any connection - dot1x system-auth-controlAristaDISA STIG Arista MLS DCS-7000 Series L2S v1r2
AOSX-14-002069 - The macOS system must uniquely identify peripherals before establishing a connection.UnixDISA STIG Apple Mac OSX 10.14 v2r1
ARST-L2-000020 - The Arista MLS layer 2 switch must uniquely identify all network-connected endpoint devices before establishing any connection.AristaDISA STIG Arista MLS EOS 4.2x L2S v1r1
BIND-9X-001106 - The BIND 9.x server implementation must utilize separate TSIG key-pairs when securing server-to-server transactions - keyUnixDISA BIND 9.x STIG v2r2
BIND-9X-001106 - The BIND 9.x server implementation must utilize separate TSIG key-pairs when securing server-to-server transactions - keyUnixDISA BIND 9.x STIG v1r9
BIND-9X-001106 - The BIND 9.x server implementation must utilize separate TSIG key-pairs when securing server-to-server transactions - zone keysUnixDISA BIND 9.x STIG v2r2
BIND-9X-001106 - The BIND 9.x server implementation must utilize separate TSIG key-pairs when securing server-to-server transactions - zone keysUnixDISA BIND 9.x STIG v1r9
BIND-9X-001106 - The BIND 9.x server implementation must utilize separate TSIG key-pairs when securing server-to-server transactions.UnixDISA BIND 9.x STIG v2r3
CASA-VN-000310 - The Cisco ASA VPN gateway must be configured to identify all peers before establishing a connection - ipsec-121CiscoDISA STIG Cisco ASA VPN v1r1
CASA-VN-000310 - The Cisco ASA VPN gateway must be configured to identify all peers before establishing a connection - ipsec-121CiscoDISA STIG Cisco ASA VPN v1r2
CASA-VN-000310 - The Cisco ASA VPN gateway must be configured to identify all peers before establishing a connection - ipsec-121CiscoDISA STIG Cisco ASA VPN v1r3
CASA-VN-000310 - The Cisco ASA VPN gateway must be configured to identify all peers before establishing a connection - local-authenticationCiscoDISA STIG Cisco ASA VPN v1r1
CASA-VN-000310 - The Cisco ASA VPN gateway must be configured to identify all peers before establishing a connection - local-authenticationCiscoDISA STIG Cisco ASA VPN v1r3
CASA-VN-000310 - The Cisco ASA VPN gateway must be configured to identify all peers before establishing a connection - local-authenticationCiscoDISA STIG Cisco ASA VPN v1r2
CASA-VN-000310 - The Cisco ASA VPN gateway must be configured to identify all peers before establishing a connection - remote-authenticationCiscoDISA STIG Cisco ASA VPN v1r1
CASA-VN-000310 - The Cisco ASA VPN gateway must be configured to identify all peers before establishing a connection - remote-authenticationCiscoDISA STIG Cisco ASA VPN v1r2
CASA-VN-000310 - The Cisco ASA VPN gateway must be configured to identify all peers before establishing a connection - remote-authenticationCiscoDISA STIG Cisco ASA VPN v1r3
CISC-L2-000020 - The Cisco switch must uniquely identify all network-connected endpoint devices before establishing any connection - aaa authenticationCiscoDISA STIG Cisco NX-OS Switch L2S v2r1
CISC-L2-000020 - The Cisco switch must uniquely identify all network-connected endpoint devices before establishing any connection - aaa authenticationCiscoDISA STIG Cisco IOS XE Switch L2S v2r2
CISC-L2-000020 - The Cisco switch must uniquely identify all network-connected endpoint devices before establishing any connection - aaa authenticationCiscoDISA STIG Cisco IOS Switch L2S v2r1
CISC-L2-000020 - The Cisco switch must uniquely identify all network-connected endpoint devices before establishing any connection - aaa authenticationCiscoDISA STIG Cisco IOS XE Switch L2S v2r1
CISC-L2-000020 - The Cisco switch must uniquely identify all network-connected endpoint devices before establishing any connection - aaa authenticationCiscoDISA STIG Cisco NX-OS Switch L2S v1r1
CISC-L2-000020 - The Cisco switch must uniquely identify all network-connected endpoint devices before establishing any connection - aaa authenticationCiscoDISA STIG Cisco IOS XE Switch L2S v1r1
CISC-L2-000020 - The Cisco switch must uniquely identify all network-connected endpoint devices before establishing any connection - aaa authenticationCiscoDISA STIG Cisco IOS Switch L2S v2r2
CISC-L2-000020 - The Cisco switch must uniquely identify all network-connected endpoint devices before establishing any connection - aaa groupCiscoDISA STIG Cisco IOS XE Switch L2S v2r2
CISC-L2-000020 - The Cisco switch must uniquely identify all network-connected endpoint devices before establishing any connection - aaa groupCiscoDISA STIG Cisco NX-OS Switch L2S v1r1
CISC-L2-000020 - The Cisco switch must uniquely identify all network-connected endpoint devices before establishing any connection - aaa groupCiscoDISA STIG Cisco IOS Switch L2S v2r1