SRG-OS-000080-GPOS-00048 Controls

STIG ID Version Title Product
OL07-00-010481 V2R10 The Oracle Linux operating system must require authentication upon booting into single-user and maintenance modes.
OL07-00-010482 V2R10 Oracle Linux operating systems version 7.2 or newer with a Basic Input/Output System (BIOS) must require authentication upon booting into single-user and maintenance modes.
OL07-00-010491 V2R10 Oracle Linux operating systems version 7.2 or newer using Unified Extensible Firmware Interface (UEFI) must require authentication upon booting into single-user and maintenance modes.
OL07-00-010483 V2R10 Oracle Linux operating systems version 7.2 or newer booted with a BIOS must have a unique name for the grub superusers account when booting into single-user and maintenance modes.
OL07-00-010492 V2R10 Oracle Linux operating systems version 7.2 or newer booted with United Extensible Firmware Interface (UEFI) must have a unique name for the grub superusers account when booting into single-user mode and maintenance.
WN10-00-000050 V3R1 Local volumes must be formatted using NTFS.
WN10-UR-000010 V3R1 The Access this computer from the network user right must only be assigned to the Administrators and Remote Desktop Users groups.
WN10-UR-000025 V3R1 The Allow log on locally user right must only be assigned to the Administrators and Users groups.
WN10-UR-000070 V3R1 The Deny access to this computer from the network user right on workstations must be configured to prevent access from highly privileged domain accounts and local accounts on domain systems and unauthenticated access on all systems.
WN10-UR-000075 V3R1 The "Deny log on as a batch job" user right on domain-joined workstations must be configured to prevent access from highly privileged domain accounts.
WN10-UR-000080 V3R1 The Deny log on as a service user right on Windows 10 domain-joined workstations must be configured to prevent access from highly privileged domain accounts.
WN10-UR-000085 V3R1 The Deny log on locally user right on workstations must be configured to prevent access from highly privileged domain accounts on domain systems and unauthenticated access on all systems.
WN10-UR-000090 V3R1 The Deny log on through Remote Desktop Services user right on Windows 10 workstations must at a minimum be configured to prevent access from highly privileged domain accounts and local accounts on domain systems and unauthenticated access on all systems.
SLES-15-010190 V1R13 SUSE operating systems with a basic input/output system (BIOS) must require authentication upon booting into single-user and maintenance modes.
SLES-15-010200 V1R13 SUSE operating systems with Unified Extensible Firmware Interface (UEFI) implemented must require authentication upon booting into single-user mode and maintenance.
RHEL-09-212010 V1R2 RHEL 9 must require a boot loader superuser password.
RHEL-09-212020 V1R2 RHEL 9 must require a unique superusers name upon booting into single-user and maintenance modes.
RHEL-09-611195 V1R2 RHEL 9 must require authentication to access emergency mode.
RHEL-09-611200 V1R2 RHEL 9 must require authentication to access single-user mode.
WN16-00-000150 V2R7 Local volumes must use a format that supports NTFS attributes.
WN16-00-000200 V2R7 Non-administrative accounts or groups must only have print permissions on printer shares.
WN16-DC-000340 V2R7 The Access this computer from the network user right must only be assigned to the Administrators, Authenticated Users, and Enterprise Domain Controllers groups on domain controllers.
WN16-DC-000360 V2R7 The Allow log on through Remote Desktop Services user right must only be assigned to the Administrators group.
WN16-DC-000370 V2R7 The Deny access to this computer from the network user right on domain controllers must be configured to prevent unauthenticated access.
WN16-DC-000380 V2R7 The Deny log on as a batch job user right on domain controllers must be configured to prevent unauthenticated access.
WN16-DC-000390 V2R7 The Deny log on as a service user right must be configured to include no accounts or groups (blank) on domain controllers.
WN16-DC-000400 V2R7 The Deny log on locally user right on domain controllers must be configured to prevent unauthenticated access.
WN16-MS-000340 V2R7 The "Access this computer from the network" user right must only be assigned to the Administrators and Authenticated Users groups on member servers.
WN16-MS-000370 V2R7 The "Deny access to this computer from the network" user right on member servers must be configured to prevent access from highly privileged domain accounts and local accounts on domain systems and from unauthenticated access on all systems.
WN16-MS-000380 V2R7 The "Deny log on as a batch job" user right on member servers must be configured to prevent access from highly privileged domain accounts on domain systems and from unauthenticated access on all systems.
WN16-MS-000390 V2R7 The "Deny log on as a service" user right on member servers must be configured to prevent access from highly privileged domain accounts on domain systems. No other groups or accounts must be assigned this right.
WN16-MS-000400 V2R7 The "Deny log on locally" user right on member servers must be configured to prevent access from highly privileged domain accounts on domain systems and from unauthenticated access on all systems.
WN16-UR-000050 V2R7 The Allow log on locally user right must only be assigned to the Administrators group.
RHEL-07-010481 V3R9 The Red Hat Enterprise Linux operating system must require authentication upon booting into single-user and maintenance modes.
RHEL-07-010482 V3R9 Red Hat Enterprise Linux operating systems version 7.2 or newer with a Basic Input/Output System (BIOS) must require authentication upon booting into single-user and maintenance modes.
RHEL-07-010491 V3R9 Red Hat Enterprise Linux operating systems version 7.2 or newer using Unified Extensible Firmware Interface (UEFI) must require authentication upon booting into single-user and maintenance modes.
RHEL-07-010483 V3R9 Red Hat Enterprise Linux operating systems version 7.2 or newer booted with a BIOS must have a unique name for the grub superusers account when booting into single-user and maintenance modes.
RHEL-07-010492 V3R9 Red Hat Enterprise Linux operating systems version 7.2 or newer booted with United Extensible Firmware Interface (UEFI) must have a unique name for the grub superusers account when booting into single-user mode and maintenance.
OL08-00-010140 V1R2 OL 8 operating systems booted with United Extensible Firmware Interface (UEFI) must require authentication upon booting into single-user mode and maintenance.
OL08-00-010141 V1R2 OL 8 operating systems booted with United Extensible Firmware Interface (UEFI) must have a unique name for the grub superusers account when booting into single-user mode and maintenance.
OL08-00-010149 V1R2 OL 8 operating systems booted with a BIOS must have a unique name for the grub superusers account when booting into single-user and maintenance modes.
OL08-00-010150 V1R2 OL 8 operating systems booted with a BIOS must require authentication upon booting into single-user and maintenance modes.
OL08-00-010151 V1R2 OL 8 operating systems must require authentication upon booting into rescue mode.
OL08-00-010152 V1R2 OL 8 operating systems must require authentication upon booting into emergency mode.
WN19-00-000130 V3R1 Windows Server 2019 local volumes must use a format that supports NTFS attributes.
WN19-00-000180 V3R1 Windows Server 2019 non-administrative accounts or groups must only have print permissions on printer shares.
WN19-DC-000340 V3R1 Windows Server 2019 Access this computer from the network user right must only be assigned to the Administrators, Authenticated Users, and Enterprise Domain Controllers groups on domain controllers.
WN19-DC-000360 V3R1 Windows Server 2019 Allow log on through Remote Desktop Services user right must only be assigned to the Administrators group on domain controllers.
WN19-DC-000370 V3R1 Windows Server 2019 Deny access to this computer from the network user right on domain controllers must be configured to prevent unauthenticated access.
WN19-DC-000380 V3R1 Windows Server 2019 Deny log on as a batch job user right on domain controllers must be configured to prevent unauthenticated access.
WN19-DC-000390 V3R1 Windows Server 2019 Deny log on as a service user right must be configured to include no accounts or groups (blank) on domain controllers.
WN19-DC-000400 V3R1 Windows Server 2019 Deny log on locally user right on domain controllers must be configured to prevent unauthenticated access.
WN19-MS-000070 V3R1 Windows Server 2019 "Access this computer from the network" user right must only be assigned to the Administrators and Authenticated Users groups on domain-joined member servers and standalone or nondomain-joined systems.
WN19-MS-000080 V3R1 Windows Server 2019 "Deny access to this computer from the network" user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts and local accounts and from unauthenticated access on all systems.
WN19-MS-000090 V3R1 Windows Server 2019 "Deny log on as a batch job" user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts and from unauthenticated access on all systems.
WN19-MS-000100 V3R1 Windows Server 2019 "Deny log on as a service" user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts. No other groups or accounts must be assigned this right.
WN19-MS-000110 V3R1 Windows Server 2019 "Deny log on locally" user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts and from unauthenticated access on all systems.
WN19-UR-000030 V3R1 Windows Server 2019 Allow log on locally user right must only be assigned to the Administrators group.
UBTU-20-010009 V1R5 Ubuntu operating systems when booted must require authentication upon booting into single-user and maintenance modes.
WN22-00-000130 V1R5 Windows Server 2022 local volumes must use a format that supports NTFS attributes.
WN22-00-000180 V1R5 Windows Server 2022 nonadministrative accounts or groups must only have print permissions on printer shares.
WN22-DC-000340 V1R5 Windows Server 2022 Access this computer from the network user right must only be assigned to the Administrators, Authenticated Users, and Enterprise Domain Controllers groups on domain controllers.
WN22-DC-000360 V1R5 Windows Server 2022 Allow log on through Remote Desktop Services user right must only be assigned to the Administrators group on domain controllers.
WN22-DC-000370 V1R5 Windows Server 2022 Deny access to this computer from the network user right on domain controllers must be configured to prevent unauthenticated access.
WN22-DC-000380 V1R5 Windows Server 2022 Deny log on as a batch job user right on domain controllers must be configured to prevent unauthenticated access.
WN22-DC-000390 V1R5 Windows Server 2022 Deny log on as a service user right must be configured to include no accounts or groups (blank) on domain controllers.
WN22-DC-000400 V1R5 Windows Server 2022 Deny log on locally user right on domain controllers must be configured to prevent unauthenticated access.
WN22-MS-000070 V1R5 Windows Server 2022 Access this computer from the network user right must only be assigned to the Administrators and Authenticated Users groups on domain-joined member servers and standalone or nondomain-joined systems.
WN22-MS-000080 V1R5 Windows Server 2022 Deny access to this computer from the network user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts and local accounts and from unauthenticated access on all systems.
WN22-MS-000090 V1R5 Windows Server 2022 Deny log on as a batch job user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts and from unauthenticated access on all systems.
WN22-MS-000100 V1R5 Windows Server 2022 Deny log on as a service user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts. No other groups or accounts must be assigned this right.
WN22-MS-000110 V1R5 Windows Server 2022 Deny log on locally user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts and from unauthenticated access on all systems.
WN22-UR-000030 V1R5 Windows Server 2022 Allow log on locally user right must only be assigned to the Administrators group.
UBTU-18-010000 V2R10 Ubuntu operating systems booted with a BIOS must require authentication upon booting into single-user and maintenance modes.
UBTU-18-010001 V2R10 Ubuntu operating systems booted with United Extensible Firmware Interface (UEFI) implemented must require authentication upon booting into single-user mode and maintenance.
UBTU-22-212010 V1R1 Ubuntu 22.04 LTS, when booted, must require authentication upon booting into single-user and maintenance modes.
APPL-14-000033 V1R2 The macOS system must disable FileVault automatic log on.
APPL-14-000080 V1R2 The macOS system must enable SSH server for remote access sessions.
APPL-14-002001 V1R2 The macOS system must disable Server Message Block sharing.
APPL-14-002003 V1R2 The macOS system must disable Network File System service.
APPL-14-002006 V1R2 The macOS system must disable Unix-to-Unix Copy Protocol service.
APPL-14-002008 V1R2 The macOS system must disable the built-in web server.
APPL-14-002009 V1R2 The macOS system must disable AirDrop.
APPL-14-002022 V1R2 The macOS system must disable Remote Apple Events.
APPL-14-002050 V1R2 The macOS system must disable Screen Sharing and Apple Remote Desktop.
APPL-14-002100 V1R2 The macOS system must disable Media Sharing.
APPL-14-002110 V1R2 The macOS system must disable Bluetooth sharing.
APPL-14-005058 V1R2 The macOS system must disable Handoff.
APPL-14-005070 V1R2 The macOS system must enable Authenticated Root.
RHEL-08-010140 V1R2 RHEL 8 operating systems booted with United Extensible Firmware Interface (UEFI) implemented must require authentication upon booting into single-user mode and maintenance.
RHEL-08-010150 V1R2 RHEL 8 operating systems booted with a BIOS must require authentication upon booting into single-user and maintenance modes.
RHEL-08-010151 V1R2 RHEL 8 operating systems must require authentication upon booting into emergency or rescue modes.
SLES-12-010430 V2R10 SUSE operating systems with a basic input/output system (BIOS) must require authentication upon booting into single-user and maintenance modes.
SLES-12-010440 V2R10 SUSE operating systems with Unified Extensible Firmware Interface (UEFI) implemented must require authentication upon booting into single-user mode and maintenance.
WN11-00-000050 V1R5 Local volumes must be formatted using NTFS.
WN11-UR-000010 V1R5 The "Access this computer from the network" user right must only be assigned to the Administrators and Remote Desktop Users groups.
WN11-UR-000025 V1R5 The "Allow log on locally" user right must only be assigned to the Administrators and Users groups.
WN11-UR-000070 V1R5 The "Deny access to this computer from the network" user right on workstations must be configured to prevent access from highly privileged domain accounts and local accounts on domain systems and unauthenticated access on all systems.
WN11-UR-000075 V1R5 The "Deny log on as a batch job" user right on domain-joined workstations must be configured to prevent access from highly privileged domain accounts.
WN11-UR-000080 V1R5 The "Deny log on as a service" user right on Windows 11 domain-joined workstations must be configured to prevent access from highly privileged domain accounts.
WN11-UR-000085 V1R5 The "Deny log on locally" user right on workstations must be configured to prevent access from highly privileged domain accounts on domain systems and unauthenticated access on all systems.
WN11-UR-000090 V1R5 The "Deny log on through Remote Desktop Services" user right on Windows 11 workstations must be configured to prevent access from highly privileged domain accounts and local accounts on domain systems and unauthenticated access on all systems.