SRG-OS-000080-GPOS-00048 Controls

STIG ID Version Title Product
APPL-14-000033 V1R2 The macOS system must disable FileVault automatic log on.
APPL-14-000080 V1R2 The macOS system must enable SSH server for remote access sessions.
APPL-14-002001 V1R2 The macOS system must disable Server Message Block sharing.
APPL-14-002003 V1R2 The macOS system must disable Network File System service.
APPL-14-002006 V1R2 The macOS system must disable Unix-to-Unix Copy Protocol service.
APPL-14-002008 V1R2 The macOS system must disable the built-in web server.
APPL-14-002009 V1R2 The macOS system must disable AirDrop.
APPL-14-002022 V1R2 The macOS system must disable Remote Apple Events.
APPL-14-002050 V1R2 The macOS system must disable Screen Sharing and Apple Remote Desktop.
APPL-14-002100 V1R2 The macOS system must disable Media Sharing.
APPL-14-002110 V1R2 The macOS system must disable Bluetooth sharing.
APPL-14-005058 V1R2 The macOS system must disable Handoff.
APPL-14-005070 V1R2 The macOS system must enable Authenticated Root.
SLES-12-010430 V2R11 SUSE operating systems with a basic input/output system (BIOS) must require authentication upon booting into single-user and maintenance modes.
SLES-12-010440 V2R11 SUSE operating systems with Unified Extensible Firmware Interface (UEFI) implemented must require authentication upon booting into single-user mode and maintenance.
RHEL-08-010140 V1R3 RHEL 8 operating systems booted with United Extensible Firmware Interface (UEFI) must require authentication upon booting into single-user mode and maintenance.
RHEL-08-010150 V1R3 RHEL 8 operating systems booted with a BIOS must require authentication upon booting into single-user and maintenance modes.
RHEL-08-010151 V1R3 RHEL 8 operating systems must require authentication upon booting into rescue mode.
RHEL-08-010141 V1R3 RHEL 8 operating systems booted with United Extensible Firmware Interface (UEFI) must require a unique superusers name upon booting into single-user mode and maintenance.
RHEL-08-010149 V1R3 RHEL 8 operating systems booted with a BIOS must require a unique superusers name upon booting into single-user and maintenance modes.
RHEL-08-010152 V1R3 RHEL 8 operating systems must require authentication upon booting into emergency mode.
UBTU-20-010009 V1R12 Ubuntu operating systems when booted must require authentication upon booting into single-user and maintenance modes.
SLES-15-010190 V1R12 SUSE operating systems with a basic input/output system (BIOS) must require authentication upon booting into single-user and maintenance modes.
SLES-15-010200 V1R12 SUSE operating systems with Unified Extensible Firmware Interface (UEFI) implemented must require authentication upon booting into single-user mode and maintenance.
WN11-00-000050 V2R2 Local volumes must be formatted using NTFS.
WN11-UR-000010 V2R2 The "Access this computer from the network" user right must only be assigned to the Administrators and Remote Desktop Users groups.
WN11-UR-000025 V2R2 The "Allow log on locally" user right must only be assigned to the Administrators and Users groups.
WN11-UR-000070 V2R2 The "Deny access to this computer from the network" user right on workstations must be configured to prevent access from highly privileged domain accounts and local accounts on domain systems and unauthenticated access on all systems.
WN11-UR-000075 V2R2 The "Deny log on as a batch job" user right on domain-joined workstations must be configured to prevent access from highly privileged domain accounts.
WN11-UR-000080 V2R2 The "Deny log on as a service" user right on Windows 11 domain-joined workstations must be configured to prevent access from highly privileged domain accounts.
WN11-UR-000085 V2R2 The "Deny log on locally" user right on workstations must be configured to prevent access from highly privileged domain accounts on domain systems and unauthenticated access on all systems.
WN11-UR-000090 V2R2 The "Deny log on through Remote Desktop Services" user right on Windows 11 workstations must be configured to prevent access from highly privileged domain accounts and local accounts on domain systems and unauthenticated access on all systems.
WN10-00-000050 V3R2 Local volumes must be formatted using NTFS.
WN10-UR-000010 V3R2 The Access this computer from the network user right must only be assigned to the Administrators and Remote Desktop Users groups.
WN10-UR-000025 V3R2 The Allow log on locally user right must only be assigned to the Administrators and Users groups.
WN10-UR-000070 V3R2 The Deny access to this computer from the network user right on workstations must be configured to prevent access from highly privileged domain accounts and local accounts on domain systems and unauthenticated access on all systems.
WN10-UR-000075 V3R2 The "Deny log on as a batch job" user right on domain-joined workstations must be configured to prevent access from highly privileged domain accounts.
WN10-UR-000080 V3R2 The Deny log on as a service user right on Windows 10 domain-joined workstations must be configured to prevent access from highly privileged domain accounts.
WN10-UR-000085 V3R2 The Deny log on locally user right on workstations must be configured to prevent access from highly privileged domain accounts on domain systems and unauthenticated access on all systems.
WN10-UR-000090 V3R2 The Deny log on through Remote Desktop Services user right on Windows 10 workstations must at a minimum be configured to prevent access from highly privileged domain accounts and local accounts on domain systems and unauthenticated access on all systems.
WN19-00-000130 V3R2 Windows Server 2019 local volumes must use a format that supports NTFS attributes.
WN19-00-000180 V3R2 Windows Server 2019 non-administrative accounts or groups must only have print permissions on printer shares.
WN19-DC-000340 V3R2 Windows Server 2019 Access this computer from the network user right must only be assigned to the Administrators, Authenticated Users, and Enterprise Domain Controllers groups on domain controllers.
WN19-DC-000360 V3R2 Windows Server 2019 Allow log on through Remote Desktop Services user right must only be assigned to the Administrators group on domain controllers.
WN19-DC-000370 V3R2 Windows Server 2019 Deny access to this computer from the network user right on domain controllers must be configured to prevent unauthenticated access.
WN19-DC-000380 V3R2 Windows Server 2019 Deny log on as a batch job user right on domain controllers must be configured to prevent unauthenticated access.
WN19-DC-000390 V3R2 Windows Server 2019 Deny log on as a service user right must be configured to include no accounts or groups (blank) on domain controllers.
WN19-DC-000400 V3R2 Windows Server 2019 Deny log on locally user right on domain controllers must be configured to prevent unauthenticated access.
WN19-MS-000070 V3R2 Windows Server 2019 "Access this computer from the network" user right must only be assigned to the Administrators and Authenticated Users groups on domain-joined member servers and standalone or nondomain-joined systems.
WN19-MS-000080 V3R2 Windows Server 2019 "Deny access to this computer from the network" user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts and local accounts and from unauthenticated access on all systems.
WN19-MS-000090 V3R2 Windows Server 2019 "Deny log on as a batch job" user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts and from unauthenticated access on all systems.
WN19-MS-000100 V3R2 Windows Server 2019 "Deny log on as a service" user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts. No other groups or accounts must be assigned this right.
WN19-MS-000110 V3R2 Windows Server 2019 "Deny log on locally" user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts and from unauthenticated access on all systems.
WN19-UR-000030 V3R2 Windows Server 2019 Allow log on locally user right must only be assigned to the Administrators group.
UBTU-22-212010 V2R2 Ubuntu 22.04 LTS, when booted, must require authentication upon booting into single-user and maintenance modes.
WN16-00-000150 V2R7 Local volumes must use a format that supports NTFS attributes.
WN16-00-000200 V2R7 Non-administrative accounts or groups must only have print permissions on printer shares.
WN16-DC-000340 V2R7 The Access this computer from the network user right must only be assigned to the Administrators, Authenticated Users, and Enterprise Domain Controllers groups on domain controllers.
WN16-DC-000360 V2R7 The Allow log on through Remote Desktop Services user right must only be assigned to the Administrators group.
WN16-DC-000370 V2R7 The Deny access to this computer from the network user right on domain controllers must be configured to prevent unauthenticated access.
WN16-DC-000380 V2R7 The Deny log on as a batch job user right on domain controllers must be configured to prevent unauthenticated access.
WN16-DC-000390 V2R7 The Deny log on as a service user right must be configured to include no accounts or groups (blank) on domain controllers.
WN16-DC-000400 V2R7 The Deny log on locally user right on domain controllers must be configured to prevent unauthenticated access.
WN16-MS-000340 V2R7 The "Access this computer from the network" user right must only be assigned to the Administrators and Authenticated Users groups on member servers.
WN16-MS-000370 V2R7 The "Deny access to this computer from the network" user right on member servers must be configured to prevent access from highly privileged domain accounts and local accounts on domain systems and from unauthenticated access on all systems.
WN16-MS-000380 V2R7 The "Deny log on as a batch job" user right on member servers must be configured to prevent access from highly privileged domain accounts on domain systems and from unauthenticated access on all systems.
WN16-MS-000390 V2R7 The "Deny log on as a service" user right on member servers must be configured to prevent access from highly privileged domain accounts on domain systems. No other groups or accounts must be assigned this right.
WN16-MS-000400 V2R7 The "Deny log on locally" user right on member servers must be configured to prevent access from highly privileged domain accounts on domain systems and from unauthenticated access on all systems.
WN16-UR-000050 V2R7 The Allow log on locally user right must only be assigned to the Administrators group.
WN22-00-000130 V1R4 Windows Server 2022 local volumes must use a format that supports NTFS attributes.
WN22-00-000180 V1R4 Windows Server 2022 nonadministrative accounts or groups must only have print permissions on printer shares.
WN22-DC-000340 V1R4 Windows Server 2022 Access this computer from the network user right must only be assigned to the Administrators, Authenticated Users, and Enterprise Domain Controllers groups on domain controllers.
WN22-DC-000360 V1R4 Windows Server 2022 Allow log on through Remote Desktop Services user right must only be assigned to the Administrators group on domain controllers.
WN22-DC-000370 V1R4 Windows Server 2022 Deny access to this computer from the network user right on domain controllers must be configured to prevent unauthenticated access.
WN22-DC-000380 V1R4 Windows Server 2022 Deny log on as a batch job user right on domain controllers must be configured to prevent unauthenticated access.
WN22-DC-000390 V1R4 Windows Server 2022 Deny log on as a service user right must be configured to include no accounts or groups (blank) on domain controllers.
WN22-DC-000400 V1R4 Windows Server 2022 Deny log on locally user right on domain controllers must be configured to prevent unauthenticated access.
WN22-MS-000070 V1R4 Windows Server 2022 Access this computer from the network user right must only be assigned to the Administrators and Authenticated Users groups on domain-joined member servers and standalone or nondomain-joined systems.
WN22-MS-000080 V1R4 Windows Server 2022 Deny access to this computer from the network user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts and local accounts and from unauthenticated access on all systems.
WN22-MS-000090 V1R4 Windows Server 2022 Deny log on as a batch job user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts and from unauthenticated access on all systems.
WN22-MS-000100 V1R4 Windows Server 2022 Deny log on as a service user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts. No other groups or accounts must be assigned this right.
WN22-MS-000110 V1R4 Windows Server 2022 Deny log on locally user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts and from unauthenticated access on all systems.
WN22-UR-000030 V1R4 Windows Server 2022 Allow log on locally user right must only be assigned to the Administrators group.
RHEL-07-010481 V3R6 The Red Hat Enterprise Linux operating system must require authentication upon booting into single-user and maintenance modes.
RHEL-07-010482 V3R6 Red Hat Enterprise Linux operating systems version 7.2 or newer with a Basic Input/Output System (BIOS) must require authentication upon booting into single-user and maintenance modes.
RHEL-07-010491 V3R6 Red Hat Enterprise Linux operating systems version 7.2 or newer using Unified Extensible Firmware Interface (UEFI) must require authentication upon booting into single-user and maintenance modes.
RHEL-07-010483 V3R6 Red Hat Enterprise Linux operating systems version 7.2 or newer booted with a BIOS must have a unique name for the grub superusers account when booting into single-user and maintenance modes.
RHEL-07-010492 V3R6 Red Hat Enterprise Linux operating systems version 7.2 or newer booted with United Extensible Firmware Interface (UEFI) must have a unique name for the grub superusers account when booting into single-user mode and maintenance.
RHEL-09-212010 V1R3 RHEL 9 must require a boot loader superuser password.
RHEL-09-212020 V1R3 RHEL 9 must require a unique superusers name upon booting into single-user and maintenance modes.
RHEL-09-611195 V1R3 RHEL 9 must require authentication to access emergency mode.
RHEL-09-611200 V1R3 RHEL 9 must require authentication to access single-user mode.
OL08-00-010140 V1R3 OL 8 operating systems booted with United Extensible Firmware Interface (UEFI) must require authentication upon booting into single-user mode and maintenance.
OL08-00-010141 V1R3 OL 8 operating systems booted with United Extensible Firmware Interface (UEFI) must have a unique name for the grub superusers account when booting into single-user mode and maintenance.
OL08-00-010149 V1R3 OL 8 operating systems booted with a BIOS must have a unique name for the grub superusers account when booting into single-user and maintenance modes.
OL08-00-010150 V1R3 OL 8 operating systems booted with a BIOS must require authentication upon booting into single-user and maintenance modes.
OL08-00-010151 V1R3 OL 8 operating systems must require authentication upon booting into rescue mode.
OL08-00-010152 V1R3 OL 8 operating systems must require authentication upon booting into emergency mode.
UBTU-18-010000 V2R11 Ubuntu operating systems booted with a BIOS must require authentication upon booting into single-user and maintenance modes.
UBTU-18-010001 V2R11 Ubuntu operating systems booted with United Extensible Firmware Interface (UEFI) implemented must require authentication upon booting into single-user mode and maintenance.
OL07-00-010481 V2R11 The Oracle Linux operating system must require authentication upon booting into single-user and maintenance modes.
OL07-00-010482 V2R11 Oracle Linux operating systems version 7.2 or newer with a Basic Input/Output System (BIOS) must require authentication upon booting into single-user and maintenance modes.
OL07-00-010491 V2R11 Oracle Linux operating systems version 7.2 or newer using Unified Extensible Firmware Interface (UEFI) must require authentication upon booting into single-user and maintenance modes.
OL07-00-010483 V2R11 Oracle Linux operating systems version 7.2 or newer booted with a BIOS must have a unique name for the grub superusers account when booting into single-user and maintenance modes.
OL07-00-010492 V2R11 Oracle Linux operating systems version 7.2 or newer booted with United Extensible Firmware Interface (UEFI) must have a unique name for the grub superusers account when booting into single-user mode and maintenance.