STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 2 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← SI-10 — Information Input Validation

CCI-001310

Definition

Checks the validity of organization-defined information inputs to the system.

Parent Control

SI-10Information Input ValidationSystem and Information Integrity

Linked STIG Checks (126)

V-237057CAT IIThe A10 Networks ADC, when used for load-balancing web servers, must not allow the HTTP TRACE and OPTIONS methods.A10 Networks ADC ALG Security Technical Implementation GuideV-76451CAT IIKona Site Defender must check the validity of all data inputs except those specifically identified by the organization.Akamai KSD Service Impact Level 2 ALG Security Technical Implementation GuideV-205027CAT IIThe ALG must check the validity of all data inputs except those specifically identified by the organization.Application Layer Gateway Security Requirements GuideV-274613CAT IIThe API must specify allowed origins when using Cross-Origin Resource Sharing (CORS).Application Programming Interface (API) Security Requirements GuideV-222602CAT IThe application must protect from Cross-Site Scripting (XSS) vulnerabilities.Application Security and Development Security Technical Implementation GuideV-222603CAT IIThe application must protect from Cross-Site Request Forgery (CSRF) vulnerabilities.Application Security and Development Security Technical Implementation GuideV-222604CAT IThe application must protect from command injection.Application Security and Development Security Technical Implementation GuideV-222605CAT IIThe application must protect from canonical representation vulnerabilities.Application Security and Development Security Technical Implementation GuideV-222606CAT IIThe application must validate all input.Application Security and Development Security Technical Implementation GuideV-222607CAT IThe application must not be vulnerable to SQL Injection.Application Security and Development Security Technical Implementation GuideV-222608CAT IThe application must not be vulnerable to XML-oriented attacks.Application Security and Development Security Technical Implementation GuideV-204772CAT IIThe application server must check the validity of all data inputs to the management interface, except those specifically identified by the organization.Application Server Security Requirements GuideV-272417CAT IA BIND 9.x server implementation must maintain the integrity and confidentiality of DNS information while it is being prepared for transmission, in transmission, and in use and must perform integrity verification and data origin verification for all DNS information.BIND 9.x Security Technical Implementation GuideV-237410CAT IIThe CA API Gateway must check the validity of all data inputs except those specifically identified by the organization.CA API Gateway ALG Security Technical Implementation GuideV-251619CAT IIIDMS must check the validity of all data input unless the organization says otherwise.CA IDMS Security Technical Implementation GuideV-251620CAT IICA IDMS must permit the use of dynamic code execution only in circumstances determined by the organization and limit use of online and batch command facilities from which dynamic statements can be issued.CA IDMS Security Technical Implementation GuideV-251621CAT IICA IDMS must limit the use of dynamic statements in applications, procedures, and exits to circumstances determined by the organization.CA IDMS Security Technical Implementation GuideV-251622CAT IICA IDMS must limit use of IDMS server used in issuing dynamic statements from client applications circumstances determined by the organization.CA IDMS Security Technical Implementation GuideV-251623CAT IICA IDMS and associated applications, when making use of dynamic code execution, must scan input data for invalid values that may indicate a code injection attack.CA IDMS Security Technical Implementation GuideV-233526CAT IIPostgreSQL must check the validity of all data inputs except those specifically identified by the organization.Crunchy Data PostgreSQL Security Technical Implementation GuideV-233527CAT IIPostgreSQL and associated applications must reserve the use of dynamic code execution for situations that require it.Crunchy Data PostgreSQL Security Technical Implementation GuideV-233528CAT IIPostgreSQL and associated applications, when making use of dynamic code execution, must scan input data for invalid values that may indicate a code injection attack.Crunchy Data PostgreSQL Security Technical Implementation GuideV-261905CAT IIPostgreSQL must check the validity of all data inputs except those specifically identified by the organization.Crunchy Data Postgres 16 Security Technical Implementation GuideV-261906CAT IIPostgreSQL and associated applications must reserve the use of dynamic code execution for situations that require it.Crunchy Data Postgres 16 Security Technical Implementation GuideV-261907CAT IIPostgreSQL and associated applications, when making use of dynamic code execution, must scan input data for invalid values that may indicate a code injection attack.Crunchy Data Postgres 16 Security Technical Implementation GuideV-206575CAT IIThe DBMS must check the validity of all data inputs except those specifically identified by the organization.Database Security Requirements GuideV-206576CAT IIThe DBMS and associated applications must reserve the use of dynamic code execution for situations that require it.Database Security Requirements GuideV-206577CAT IIThe DBMS and associated applications, when making use of dynamic code execution, must scan input data for invalid values that may indicate a code injection attack.Database Security Requirements GuideV-205191CAT IIThe DNS server implementation must check the validity of all data inputs except those specifically identified by the organization.Domain Name System (DNS) Security Requirements GuideV-224182CAT IIThe EDB Postgres Advanced Server must check the validity of all data inputs except those specifically identified by the organization.EDB Postgres Advanced Server v11 on Windows Security Technical Implementation GuideV-224183CAT IIThe EDB Postgres Advanced Server and associated applications must reserve the use of dynamic code execution for situations that require it.EDB Postgres Advanced Server v11 on Windows Security Technical Implementation GuideV-224184CAT IIThe EDB Postgres Advanced Server and associated applications, when making use of dynamic code execution, must scan input data for invalid values that may indicate a code injection attack.EDB Postgres Advanced Server v11 on Windows Security Technical Implementation GuideV-213608CAT IIThe EDB Postgres Advanced Server must check the validity of all data inputs except those specifically identified by the organization.EDB Postgres Advanced Server v9.6 Security Technical Implementation GuideV-213609CAT IIThe EDB Postgres Advanced Server and associated applications must reserve the use of dynamic code execution for situations that require it.EDB Postgres Advanced Server v9.6 Security Technical Implementation GuideV-213610CAT IIThe EDB Postgres Advanced Server and associated applications, when making use of dynamic code execution, must scan input data for invalid values that may indicate a code injection attack.EDB Postgres Advanced Server v9.6 Security Technical Implementation GuideV-259263CAT IIThe EDB Postgres Advanced Server must check the validity of all data inputs except those specifically identified by the organization.EnterpriseDB Postgres Advanced Server (EPAS) Security Technical Implementation GuideV-259264CAT IIThe EDB Postgres Advanced Server and associated applications must reserve the use of dynamic code execution for situations that require it.EnterpriseDB Postgres Advanced Server (EPAS) Security Technical Implementation GuideV-259265CAT IIThe EDB Postgres Advanced Server and associated applications, when making use of dynamic code execution, must scan input data for invalid values that may indicate a code injection attack.EnterpriseDB Postgres Advanced Server (EPAS) Security Technical Implementation GuideV-214516CAT IIThe BIG-IP ASM module must check the validity of all data inputs except those specifically identified by the organization.F5 BIG-IP Application Security Manager Security Technical Implementation GuideV-215797CAT IIThe BIG-IP Core implementation must be configured to check the validity of all data inputs except those specifically identified by the organization.F5 BIG-IP Local Traffic Manager Security Technical Implementation GuideV-266158CAT IIThe F5 BIG-IP appliance must check the validity of all data inputs except those specifically identified by the organization.F5 BIG-IP TMOS ALG Security Technical Implementation GuideV-213710CAT IIDB2 must check the validity of all data inputs except those specifically identified by the organization.IBM DB2 V10.5 LUW Security Technical Implementation GuideV-213711CAT IIDB2 and associated applications must reserve the use of dynamic code execution for situations that require it.IBM DB2 V10.5 LUW Security Technical Implementation GuideV-213712CAT IIDB2 and associated applications, when making use of dynamic code execution, must scan input data for invalid values that may indicate a code injection attack.IBM DB2 V10.5 LUW Security Technical Implementation GuideV-65307CAT IIThe DataPower Gateway must check the validity of all data inputs except those specifically identified by the organization.IBM DataPower ALG Security Technical Implementation GuideV-55351CAT IIThe IDPS must, for fragmented packets, either block the packets or properly reassemble the packets before inspecting and forwarding.Intrusion Detection and Prevention Systems (IDPS) Security Requirements GuideV-206921CAT IIThe IDPS must, for fragmented packets, either block the packets or properly reassemble the packets before inspecting and forwarding.Intrusion Detection and Prevention Systems Security Requirements GuideV-241790CAT IIWhen the Jamf Pro EMM server cannot establish a connection to determine the validity of a certificate, the server must not have the option to accept the certificate.Jamf Pro v10.x EMM Security Technical Implementation GuideV-213776CAT IISQL Server must check the validity of all data inputs except those specifically identified by the organization.MS SQL Server 2014 Database Security Technical Implementation GuideV-213782CAT IIThe DBMS and associated applications must reserve the use of dynamic code execution for situations that require it.MS SQL Server 2014 Database Security Technical Implementation GuideV-213783CAT IIThe DBMS and associated applications, when making use of dynamic code execution, must scan input data for invalid values that may indicate a code injection attack.MS SQL Server 2014 Database Security Technical Implementation GuideV-213916CAT IISQL Server must check the validity of all data inputs except those specifically identified by the organization.MS SQL Server 2016 Database Security Technical Implementation GuideV-205523CAT IIThe Mainframe Product must check the validity of all data inputs except those specifically identified by the organization.Mainframe Product Security Requirements GuideV-253714CAT IIMariaDB must check the validity of all data inputs except those specifically identified by the organization.MariaDB Enterprise 10.x Security Technical Implementation GuideV-253715CAT IIMariaDB and associated applications must reserve the use of dynamic code execution for situations that require it.MariaDB Enterprise 10.x Security Technical Implementation GuideV-253716CAT IIMariaDB and associated applications, when making use of dynamic code execution, must scan input data for invalid values that may indicate a code injection attack.MariaDB Enterprise 10.x Security Technical Implementation GuideV-255310CAT IIAzure SQL Database must check the validity of all data inputs except those specifically identified by the organization.Microsoft Azure SQL Database Security Technical Implementation GuideV-255311CAT IIThe Azure SQL Database and associated applications must reserve the use of dynamic code execution for situations that require it.Microsoft Azure SQL Database Security Technical Implementation GuideV-255312CAT IIThe Azure SQL Database and associated applications, when making use of dynamic code execution, must scan input data for invalid values that may indicate a code injection attack.Microsoft Azure SQL Database Security Technical Implementation GuideV-276230CAT IIAzure SQL Managed Instance and associated applications, when making use of dynamic code execution, must scan input data for invalid values that may indicate a code injection attack.Microsoft Azure SQL Managed Instance Security Technical Implementation GuideV-276291CAT IIAzure SQL Managed Instance must check the validity of all data inputs except those specifically identified by the organization.Microsoft Azure SQL Managed Instance Security Technical Implementation GuideV-218808CAT IIDirectory Browsing on the IIS 10.0 web server must be disabled.Microsoft IIS 10.0 Server Security Technical Implementation GuideV-218759CAT IIDirectory Browsing on the IIS 10.0 website must be disabled.Microsoft IIS 10.0 Site Security Technical Implementation GuideV-271176CAT IISQL Server must check the validity of all data inputs except those specifically identified by the organization.Microsoft SQL Server 2022 Database Security Technical Implementation GuideV-271331CAT IISQL Server and associated applications must reserve the use of dynamic code execution for situations that require it.Microsoft SQL Server 2022 Instance Security Technical Implementation GuideV-271332CAT IISQL Server and associated applications, when making use of dynamic code execution, must scan input data for invalid values that may indicate a code injection attack.Microsoft SQL Server 2022 Instance Security Technical Implementation GuideV-215638CAT IIThe Windows 2012 DNS Server must be configured to only allow zone information that reflects the environment for which it is authoritative, to include IP ranges and IP versions.Microsoft Windows 2012 Server Domain Name System Security Technical Implementation GuideV-259401CAT IIThe Windows DNS Server must be configured to only allow zone information that reflects the environment for which it is authoritative, including IP ranges and IP versions.Microsoft Windows Server Domain Name System (DNS) Security Technical Implementation GuideV-221181CAT IIMongoDB must check the validity of all data inputs except those specifically identified by the organization.MongoDB Enterprise Advanced 3.x Security Technical Implementation GuideV-221182CAT IIMongoDB and associated applications must reserve the use of dynamic code execution for situations that require it.MongoDB Enterprise Advanced 3.x Security Technical Implementation GuideV-252143CAT IIMongoDB and associated applications must reserve the use of dynamic code execution for situations that require it.MongoDB Enterprise Advanced 4.x Security Technical Implementation GuideV-252167CAT IIMongoDB must check the validity of all data inputs except those specifically identified by the organization.MongoDB Enterprise Advanced 4.x Security Technical Implementation GuideV-265929CAT IIMongoDB must check the validity of all data inputs except those specifically identified by the organization.MongoDB Enterprise Advanced 7.x Security Technical Implementation GuideV-265930CAT IIMongoDB and associated applications must reserve the use of dynamic code execution for situations that require it.MongoDB Enterprise Advanced 7.x Security Technical Implementation GuideV-279365CAT IIMongoDB must check the validity of all data inputs except those specifically identified by the organization.MongoDB Enterprise Advanced 8.x Security Technical Implementation GuideV-279366CAT IIMongoDB and associated applications must reserve the use of dynamic code execution for situations that require it.MongoDB Enterprise Advanced 8.x Security Technical Implementation GuideV-219784CAT IIThe DBMS must check the validity of data inputs.Oracle Database 11.2g Security Technical Implementation GuideV-220300CAT IIThe DBMS must check the validity of data inputs.Oracle Database 12c Security Technical Implementation GuideV-270580CAT IIOracle Database must check the validity of data inputs.Oracle Database 19c Security Technical Implementation GuideV-270581CAT IIThe database management system (DBMS) and associated applications must reserve the use of dynamic code execution for situations that require it.Oracle Database 19c Security Technical Implementation GuideV-270582CAT IIThe database management system (DBMS) and associated applications, when making use of dynamic code execution, must take steps against invalid values that may be used in a SQL injection attack, therefore resulting in steps to prevent a SQL injection attack.Oracle Database 19c Security Technical Implementation GuideV-235156CAT IIThe MySQL Database Server 8.0 must check the validity of all data inputs except those specifically identified by the organization.Oracle MySQL 8.0 Security Technical Implementation GuideV-235157CAT IIThe MySQL Database Server 8.0 and associated applications must reserve the use of dynamic code execution for situations that require it.Oracle MySQL 8.0 Security Technical Implementation GuideV-235158CAT IIThe MySQL Database Server 8.0 and associated applications, when making use of dynamic code execution, must scan input data for invalid values that may indicate a code injection attack.Oracle MySQL 8.0 Security Technical Implementation GuideV-214063CAT IIPostgreSQL must check the validity of all data inputs except those specifically identified by the organization.PostgreSQL 9.x Security Technical Implementation GuideV-214064CAT IIPostgreSQL and associated applications must reserve the use of dynamic code execution for situations that require it.PostgreSQL 9.x Security Technical Implementation GuideV-214065CAT IIPostgreSQL and associated applications, when making use of dynamic code execution, must scan input data for invalid values that may indicate a code injection attack.PostgreSQL 9.x Security Technical Implementation GuideV-251250CAT IIRedis Enterprise DBMS and associated applications must reserve the use of dynamic code execution for situations that require it.Redis Enterprise 6.x Security Technical Implementation GuideV-251251CAT IIRedis Enterprise DBMS and associated applications, when making use of dynamic code execution, must scan input data for invalid values that may indicate a code injection attack.Redis Enterprise 6.x Security Technical Implementation GuideV-234421CAT IIThe UEM server must check the validity of all data inputs.Unified Endpoint Management Server Security Requirements GuideV-240824CAT IItc Server HORIZON must set URIEncoding to UTF-8.VMware vRealize Automation 7.x tc Server Security Technical Implementation GuideV-240825CAT IItc Server VCO must set URIEncoding to UTF-8.VMware vRealize Automation 7.x tc Server Security Technical Implementation GuideV-240826CAT IItc Server HORIZON must use the setCharacterEncodingFilter filter.VMware vRealize Automation 7.x tc Server Security Technical Implementation GuideV-240827CAT IItc Server VCO must use the setCharacterEncodingFilter filter.VMware vRealize Automation 7.x tc Server Security Technical Implementation GuideV-240828CAT IItc Server VCAC must set URIEncoding to UTF-8.VMware vRealize Automation 7.x tc Server Security Technical Implementation GuideV-240829CAT IItc Server VCAC must use the setCharacterEncodingFilter filter.VMware vRealize Automation 7.x tc Server Security Technical Implementation GuideV-241679CAT IItc Server UI must set URIEncoding to UTF-8.VMware vRealize Operations Manager 6.x tc Server Security Technical Implementation GuideV-241680CAT IItc Server CaSa must set URIEncoding to UTF-8.VMware vRealize Operations Manager 6.x tc Server Security Technical Implementation GuideV-241681CAT IItc Server API must set URIEncoding to UTF-8.VMware vRealize Operations Manager 6.x tc Server Security Technical Implementation GuideV-241682CAT IItc Server UI must use the setCharacterEncodingFilter filter.VMware vRealize Operations Manager 6.x tc Server Security Technical Implementation GuideV-241683CAT IItc Server CaSa must use the setCharacterEncodingFilter filter.VMware vRealize Operations Manager 6.x tc Server Security Technical Implementation GuideV-241684CAT IItc Server API must use the setCharacterEncodingFilter filter.VMware vRealize Operations Manager 6.x tc Server Security Technical Implementation GuideV-256663CAT IIVAMI must set the encoding for all text Multipurpose Internet Mail Extensions (MIME) types to UTF-8.VMware vSphere 7.0 VAMI Security Technical Implementation GuideV-256692CAT IIESX Agent Manager must set URIEncoding to UTF-8.VMware vSphere 7.0 vCenter Appliance EAM Security Technical Implementation GuideV-256693CAT IIESX Agent Manager must use the "setCharacterEncodingFilter" filter.VMware vSphere 7.0 vCenter Appliance EAM Security Technical Implementation GuideV-256725CAT IILookup Service must set URIEncoding to UTF-8.VMware vSphere 7.0 vCenter Appliance Lookup Service Security Technical Implementation GuideV-256630CAT IIPerformance Charts must set "URIEncoding" to UTF-8.VMware vSphere 7.0 vCenter Appliance Perfcharts Security Technical Implementation GuideV-256631CAT IIPerformance Charts must use the "setCharacterEncodingFilter" filter.VMware vSphere 7.0 vCenter Appliance Perfcharts Security Technical Implementation GuideV-256764CAT IIThe Security Token Service must set "URIEncoding" to UTF-8.VMware vSphere 7.0 vCenter Appliance STS Security Technical Implementation GuideV-256765CAT IIThe Security Token Service must use the "setCharacterEncodingFilter" filter.VMware vSphere 7.0 vCenter Appliance STS Security Technical Implementation GuideV-256798CAT IIvSphere UI must set URIEncoding to UTF-8.VMware vSphere 7.0 vCenter Appliance UI Security Technical Implementation GuideV-259013CAT IIThe vCenter ESX Agent Manager service must set URIEncoding to UTF-8.VMware vSphere 8.0 vCenter Appliance ESX Agent Manager (EAM) Security Technical Implementation GuideV-259020CAT IIThe vCenter ESX Agent Manager service must configure the "setCharacterEncodingFilter" filter.VMware vSphere 8.0 vCenter Appliance ESX Agent Manager (EAM) Security Technical Implementation GuideV-259047CAT IIThe vCenter Lookup service must set URIEncoding to UTF-8.VMware vSphere 8.0 vCenter Appliance Lookup Service Security Technical Implementation GuideV-259054CAT IIThe vCenter Lookup service must configure the "setCharacterEncodingFilter" filter.VMware vSphere 8.0 vCenter Appliance Lookup Service Security Technical Implementation GuideV-259150CAT IIThe vCenter VAMI service must set the encoding for all text mime types to UTF-8.VMware vSphere 8.0 vCenter Appliance Management Interface (VAMI) Security Technical Implementation GuideV-259081CAT IIThe vCenter Perfcharts service must set URIEncoding to UTF-8.VMware vSphere 8.0 vCenter Appliance Perfcharts Security Technical Implementation GuideV-259088CAT IIThe vCenter Perfcharts service must configure the "setCharacterEncodingFilter" filter.VMware vSphere 8.0 vCenter Appliance Perfcharts Security Technical Implementation GuideV-258981CAT IIThe vCenter STS service must set URIEncoding to UTF-8.VMware vSphere 8.0 vCenter Appliance Secure Token Service (STS) Security Technical Implementation GuideV-258987CAT IIThe vCenter STS service must configure the "setCharacterEncodingFilter" filter.VMware vSphere 8.0 vCenter Appliance Secure Token Service (STS) Security Technical Implementation GuideV-259114CAT IIThe vCenter UI service must set URIEncoding to UTF-8.VMware vSphere 8.0 vCenter Appliance User Interface (UI) Security Technical Implementation GuideV-259121CAT IIThe vCenter UI service must configure the "setCharacterEncodingFilter" filter.VMware vSphere 8.0 vCenter Appliance User Interface (UI) Security Technical Implementation GuideV-207409CAT IIThe VMM must check the validity of all data inputs except those specifically identified by the organization.Virtual Machine Manager Security Requirements GuideV-206410CAT IIThe web server must limit the character set used for data entry.Web Server Security Requirements GuideV-264364CAT IIThe web server must interpret and normalize ambiguous HTTP requests or terminate the TCP connection.Web Server Security Requirements GuideV-264365CAT IIThe web server must terminate the connection if server-level exceptions are triggered when handling requests to prevent HTTP request smuggling attacks.Web Server Security Requirements Guide