SRG-OS-000138-GPOS-00069 Controls

STIG ID Version Title Product
SLES-12-010460 V2R11 The sticky bit must be set on all SUSE operating system world-writable directories.
SLES-12-010375 V2R11 The SUSE operating system must restrict access to the kernel message buffer.
RHEL-08-010180 V1R3 All RHEL 8 public directories must be owned by root or a system account to prevent unauthorized and unintended information transferred via shared system resources.
RHEL-08-010190 V1R3 A sticky bit must be set on all RHEL 8 public directories to prevent unauthorized and unintended information transferred via shared system resources.
RHEL-08-010375 V1R3 RHEL 8 must restrict access to the kernel message buffer.
RHEL-08-010376 V1R3 RHEL 8 must prevent kernel profiling by unprivileged users.
UBTU-20-010411 V1R12 The Ubuntu operating system must set a sticky bit on all public directories to prevent unauthorized and unintended information transferred via shared system resources.
UBTU-20-010401 V1R12 The Ubuntu operating system must restrict access to the kernel message buffer.
SLES-15-010300 V1R12 The sticky bit must be set on all SUSE operating system world-writable directories.
SLES-15-010375 V1R12 The SUSE operating system must restrict access to the kernel message buffer.
WN11-00-000060 V2R2 Non-system-created file shares on a system must limit access to groups that require it.
WN11-CC-000155 V2R2 Solicited Remote Assistance must not be allowed.
WN11-CC-000275 V2R2 Local drives must be prevented from sharing with Remote Desktop Session Hosts.
WN11-SO-000150 V2R2 Anonymous enumeration of shares must be restricted.
WN11-SO-000165 V2R2 Anonymous access to Named Pipes and Shares must be restricted.
WN10-00-000060 V3R2 Non system-created file shares on a system must limit access to groups that require it.
WN10-CC-000155 V3R2 Solicited Remote Assistance must not be allowed.
WN10-CC-000275 V3R2 Local drives must be prevented from sharing with Remote Desktop Session Hosts.
WN10-EP-000310 V3R2 Windows 10 Kernel (Direct Memory Access) DMA Protection must be enabled.
WN10-SO-000150 V3R2 Anonymous enumeration of shares must be restricted.
WN10-SO-000165 V3R2 Anonymous access to Named Pipes and Shares must be restricted.
WN19-00-000230 V3R2 Windows Server 2019 non-system-created file shares must limit access to groups that require it.
WN19-CC-000350 V3R2 Windows Server 2019 Remote Desktop Services must prevent drive redirection.
WN19-DC-000120 V3R2 Windows Server 2019 data files owned by users must be on a different logical partition from the directory server data files.
WN19-SO-000230 V3R2 Windows Server 2019 must not allow anonymous enumeration of shares.
WN19-SO-000250 V3R2 Windows Server 2019 must restrict anonymous access to Named Pipes and Shares.
UBTU-22-213010 V2R2 Ubuntu 22.04 LTS must restrict access to the kernel message buffer.
UBTU-22-232145 V2R2 Ubuntu 22.04 LTS must set a sticky bit on all public directories to prevent unauthorized and unintended information transferred via shared system resources.
WN16-00-000250 V2R7 Non-system-created file shares on a system must limit access to groups that require it.
WN16-CC-000380 V2R7 Local drives must be prevented from sharing with Remote Desktop Session Hosts.
WN16-DC-000120 V2R7 Data files owned by users must be on a different logical partition from the directory server data files.
WN16-SO-000270 V2R7 Anonymous enumeration of shares must not be allowed.
WN16-SO-000300 V2R7 Anonymous access to Named Pipes and Shares must be restricted.
WN22-00-000230 V1R4 Windows Server 2022 nonsystem-created file shares must limit access to groups that require it.
WN22-CC-000350 V1R4 Windows Server 2022 Remote Desktop Services must prevent drive redirection.
WN22-DC-000120 V1R4 Windows Server 2022 data files owned by users must be on a different logical partition from the directory server data files.
WN22-SO-000230 V1R4 Windows Server 2022 must not allow anonymous enumeration of shares.
WN22-SO-000250 V1R4 Windows Server 2022 must restrict anonymous access to Named Pipes and Shares.
RHEL-09-232245 V1R3 A sticky bit must be set on all RHEL 9 public directories.
OL08-00-010190 V1R3 A sticky bit must be set on all OL 8 public directories to prevent unauthorized and unintended information transferred via shared system resources.
OL08-00-010375 V1R3 OL 8 must restrict access to the kernel message buffer.
OL08-00-010376 V1R3 OL 8 must prevent kernel profiling by unprivileged users.
UBTU-18-010120 V2R11 The Ubuntu operating system must set a sticky bit on all public directories to prevent unauthorized and unintended information transferred via shared system resources.
UBTU-18-010510 V2R11 The Ubuntu operating system must restrict access to the kernel message buffer.
OL07-00-010375 V2R11 The Oracle Linux operating system must restrict access to the kernel message buffer.