SRG-OS-000134-GPOS-00068 Controls

STIG IDVersionTitleProduct
ALMA-09-041930V1R4AlmaLinux OS 9 must use a Linux Security Module configured to enforce limits on system services.
ALMA-09-042040V1R4AlmaLinux OS 9 must have the policycoreutils package installed.
OL08-00-010170V2R6OL 8 must use a Linux Security Module configured to enforce limits on system services.
OL08-00-010171V2R6OL 8 must have the "policycoreutils" package installed.
OL08-00-010421V2R6OL 8 must clear the page allocator to prevent use-after-free attacks.
OL08-00-010422V2R6OL 8 must disable virtual syscalls.
OL08-00-010423V2R6OL 8 must clear memory when it is freed to prevent use-after-free attacks.
OL09-00-000200V1R3OL 9 must have policycoreutils package installed.
OL09-00-002393V1R3OL 9 must disable virtual system calls.
OL09-00-002394V1R3OL 9 must clear the page allocator to prevent use-after-free attacks.
RHEL-08-010170V2R5RHEL 8 must use a Linux Security Module configured to enforce limits on system services.
RHEL-08-010171V2R5RHEL 8 must have policycoreutils package installed.
RHEL-08-010421V2R5RHEL 8 must clear the page allocator to prevent use-after-free attacks.
RHEL-08-010422V2R5RHEL 8 must disable virtual syscalls.
RHEL-08-010423V2R5RHEL 8 must clear memory when it is freed to prevent use-after-free attacks.
TOSS-04-010090V2R3TOSS must use a Linux Security Module configured to enforce limits on system services.
TOSS-04-040310V2R3TOSS must have policycoreutils package installed.
UBTU-18-010037V2R15The Ubuntu operating system must be configured so that only users who need access to security functions are part of the sudo group.
UBTU-20-010012V2R3The Ubuntu operating system must ensure only users who need access to security functions are part of sudo group.
UBTU-22-432015V2R6Ubuntu 22.04 LTS must ensure only users who need access to security functions are part of sudo group.
UBTU-24-600130V1R1Ubuntu 24.04 LTS must ensure only users who need access to security functions are part of sudo group.
WN10-CC-000037V3R4Local administrator accounts must have their privileged token filtered to prevent elevated privileges from being used over the network on domain systems.
WN10-CC-000200V3R4Administrator accounts must not be enumerated during elevation.
WN10-SO-000250V3R4User Account Control must, at minimum, prompt administrators for consent on the secure desktop.
WN10-SO-000260V3R4User Account Control must be configured to detect application installations and prompt for elevation.
WN10-SO-000265V3R4User Account Control must only elevate UIAccess applications that are installed in secure locations.
WN10-SO-000275V3R4User Account Control must virtualize file and registry write failures to per-user locations.
WN11-CC-000037V2R5Local administrator accounts must have their privileged token filtered to prevent elevated privileges from being used over the network on domain systems.
WN11-CC-000200V2R5Administrator accounts must not be enumerated during elevation.
WN11-SO-000250V2R5User Account Control must prompt administrators for consent on the secure desktop.
WN11-SO-000260V2R5User Account Control must be configured to detect application installations and prompt for elevation.
WN11-SO-000265V2R5User Account Control must only elevate UIAccess applications that are installed in secure locations.
WN11-SO-000275V2R5User Account Control must virtualize file and registry write failures to per-user locations.
WN16-CC-000280V2R9Administrator accounts must not be enumerated during elevation.
WN16-MS-000020V2R9Local administrator accounts must have their privileged token filtered to prevent elevated privileges from being used over the network on domain systems.
WN16-SO-000470V2R9UIAccess applications must not be allowed to prompt for elevation without using the secure desktop.
WN16-SO-000480V2R9User Account Control must, at a minimum, prompt administrators for consent on the secure desktop.
WN16-SO-000500V2R9User Account Control must be configured to detect application installations and prompt for elevation.
WN16-SO-000510V2R9User Account Control must only elevate UIAccess applications that are installed in secure locations.
WN16-SO-000530V2R9User Account Control must virtualize file and registry write failures to per-user locations.
WN19-CC-000240V3R6Windows Server 2019 administrator accounts must not be enumerated during elevation.
WN19-MS-000020V3R6Windows Server 2019 local administrator accounts must have their privileged token filtered to prevent elevated privileges from being used over the network on domain-joined member servers.
WN19-SO-000390V3R6Windows Server 2019 UIAccess applications must not be allowed to prompt for elevation without using the secure desktop.
WN19-SO-000400V3R6Windows Server 2019 User Account Control must, at a minimum, prompt administrators for consent on the secure desktop.
WN19-SO-000420V3R6Windows Server 2019 User Account Control must be configured to detect application installations and prompt for elevation.
WN19-SO-000430V3R6Windows Server 2019 User Account Control (UAC) must only elevate UIAccess applications that are installed in secure locations.
WN19-SO-000450V3R6Windows Server 2019 User Account Control (UAC) must virtualize file and registry write failures to per-user locations.
WN22-CC-000240V2R6Windows Server 2022 administrator accounts must not be enumerated during elevation.
WN22-MS-000020V2R6Windows Server 2022 local administrator accounts must have their privileged token filtered to prevent elevated privileges from being used over the network on domain-joined member servers.
WN22-SO-000390V2R6Windows Server 2022 UIAccess applications must not be allowed to prompt for elevation without using the secure desktop.
WN22-SO-000400V2R6Windows Server 2022 User Account Control (UAC) must, at a minimum, prompt administrators for consent on the secure desktop.
WN22-SO-000420V2R6Windows Server 2022 User Account Control (UAC) must be configured to detect application installations and prompt for elevation.
WN22-SO-000430V2R6Windows Server 2022 User Account Control (UAC) must only elevate UIAccess applications that are installed in secure locations.
WN22-SO-000450V2R6Windows Server 2022 User Account Control (UAC) must virtualize file and registry write failures to per-user locations.