SRG-OS-000480-GPOS-00227 Controls

STIG ID Version Title Product
APPL-14-000016 V1R2 The macOS system must be integrated into a directory services infrastructure.
APPL-14-003013 V1R2 The macOS system must enable firmware password.
APPL-14-005110 V1R2 The macOS system must enforce enrollment in mobile device management.
APPL-14-005120 V1R2 The macOS system must enable recovery lock.
APPL-14-005130 V1R2 The macOS system must enforce installation of XProtect Remediator and Gatekeeper updates automatically.
SLES-12-010000 V2R11 The SUSE operating system must be a vendor-supported release.
SLES-12-010010 V2R11 Vendor-packaged SUSE operating system security patches and updates must be installed and up to date.
SLES-12-010231 V2R11 The SUSE operating system must not be configured to allow blank or null passwords.
SLES-12-010390 V2R11 The SUSE operating system must display the date and time of the last successful account logon upon logon.
SLES-12-010400 V2R11 There must be no .shosts files on the SUSE operating system.
SLES-12-010410 V2R11 There must be no shosts.equiv files on the SUSE operating system.
SLES-12-010520 V2R11 The SUSE operating system file integrity tool must be configured to verify Access Control Lists (ACLs).
SLES-12-010530 V2R11 The SUSE operating system file integrity tool must be configured to verify extended attributes.
SLES-12-010610 V2R11 The SUSE operating system must disable the x86 Ctrl-Alt-Delete key sequence.
SLES-12-010611 V2R11 The SUSE operating system must disable the x86 Ctrl-Alt-Delete key sequence for Graphical User Interfaces.
SLES-12-010630 V2R11 The SUSE operating system must not have unnecessary accounts.
SLES-12-010650 V2R11 The SUSE operating system root account must be the only account having unrestricted access to the system.
SLES-12-010690 V2R11 All SUSE operating system files and directories must have a valid owner.
SLES-12-010700 V2R11 All SUSE operating system files and directories must have a valid group owner.
SLES-12-010710 V2R11 All SUSE operating system local interactive users must have a home directory assigned in the /etc/passwd file.
SLES-12-010720 V2R11 All SUSE operating system local interactive user accounts, upon creation, must be assigned a home directory.
SLES-12-010730 V2R11 All SUSE operating system local interactive user home directories defined in the /etc/passwd file must exist.
SLES-12-010740 V2R11 All SUSE operating system local interactive user home directories must have mode 0750 or less permissive.
SLES-12-010750 V2R11 All SUSE operating system local interactive user home directories must be group-owned by the home directory owners primary group.
SLES-12-010760 V2R11 All SUSE operating system local initialization files must have mode 0740 or less permissive.
SLES-12-010770 V2R11 All SUSE operating system local interactive user initialization files executable search paths must contain only paths that resolve to the users home directory.
SLES-12-010780 V2R11 All SUSE operating system local initialization files must not execute world-writable programs.
SLES-12-010790 V2R11 SUSE operating system file systems that contain user home directories must be mounted to prevent files with the setuid and setgid bit set from being executed.
SLES-12-010800 V2R11 SUSE operating system file systems that are used with removable media must be mounted to prevent files with the setuid and setgid bit set from being executed.
SLES-12-010810 V2R11 SUSE operating system file systems that are being imported via Network File System (NFS) must be mounted to prevent files with the setuid and setgid bit set from being executed.
SLES-12-010820 V2R11 SUSE operating system file systems that are being imported via Network File System (NFS) must be mounted to prevent binary files from being executed.
SLES-12-010830 V2R11 All SUSE operating system world-writable directories must be group-owned by root, sys, bin, or an application group.
SLES-12-010840 V2R11 SUSE operating system kernel core dumps must be disabled unless needed.
SLES-12-010850 V2R11 A separate file system must be used for SUSE operating system user home directories (such as /home or an equivalent).
SLES-12-010860 V2R11 The SUSE operating system must use a separate file system for /var.
SLES-12-010870 V2R11 The SUSE operating system must use a separate file system for the system audit data path.
SLES-12-010910 V2R11 The SUSE operating system must be configured to not overwrite Pluggable Authentication Modules (PAM) configuration on package changes.
SLES-12-020199 V2R11 The SUSE operating system must not disable syscall auditing.
SLES-12-030130 V2R11 The SUSE operating system must display the date and time of the last successful account logon upon an SSH logon.
SLES-12-030200 V2R11 The SUSE operating system SSH daemon must be configured to not allow authentication using known hosts authentication.
SLES-12-030210 V2R11 The SUSE operating system SSH daemon public host key files must have mode 0644 or less permissive.
SLES-12-030220 V2R11 The SUSE operating system SSH daemon private host key files must have mode 0640 or less permissive.
SLES-12-030230 V2R11 The SUSE operating system SSH daemon must perform strict mode checking of home directory configuration files.
SLES-12-030240 V2R11 The SUSE operating system SSH daemon must use privilege separation.
SLES-12-030250 V2R11 The SUSE operating system SSH daemon must not allow compression or must only allow compression after successful authentication.
SLES-12-030260 V2R11 The SUSE operating system SSH daemon must disable forwarded remote X connections for interactive users, unless to fulfill documented and validated mission requirements.
SLES-12-030360 V2R11 The SUSE operating system must not forward Internet Protocol version 4 (IPv4) source-routed packets.
SLES-12-030361 V2R11 The SUSE operating system must not forward Internet Protocol version 6 (IPv6) source-routed packets.
SLES-12-030370 V2R11 The SUSE operating system must not forward Internet Protocol version 4 (IPv4) source-routed packets by default.
SLES-12-030380 V2R11 The SUSE operating system must not respond to Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) echoes sent to a broadcast address.
SLES-12-030390 V2R11 The SUSE operating system must prevent Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirect messages from being accepted.
SLES-12-030400 V2R11 The SUSE operating system must not allow interfaces to accept Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirect messages by default.
SLES-12-030401 V2R11 The SUSE operating system must not allow interfaces to accept Internet Protocol version 6 (IPv6) Internet Control Message Protocol (ICMP) redirect messages by default.
SLES-12-030410 V2R11 The SUSE operating system must not allow interfaces to send Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirect messages by default.
SLES-12-030420 V2R11 The SUSE operating system must not send Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirects.
SLES-12-030430 V2R11 The SUSE operating system must not be performing Internet Protocol version 4 (IPv4) packet forwarding unless the system is a router.
SLES-12-030440 V2R11 The SUSE operating system must not have network interfaces in promiscuous mode unless approved and documented.
SLES-12-030611 V2R11 The SUSE operating system must use a virus scan program.
SLES-12-030261 V2R11 The SUSE operating system SSH daemon must prevent remote hosts from connecting to the proxy display.
SLES-12-010111 V2R11 The SUSE operating system must restrict privilege elevation to authorized personnel.
SLES-12-010112 V2R11 The SUSE operating system must use the invoking user's password for privilege escalation when using "sudo".
SLES-12-010631 V2R11 The SUSE operating system must not have unnecessary account capabilities.
SLES-12-030362 V2R11 The SUSE operating system must not forward Internet Protocol version 6 (IPv6) source-routed packets by default.
SLES-12-030363 V2R11 The SUSE operating system must prevent Internet Protocol version 6 (IPv6) Internet Control Message Protocol (ICMP) redirect messages from being accepted.
SLES-12-030364 V2R11 The SUSE operating system must not be performing Internet Protocol version 6 (IPv6) packet forwarding unless the system is a router.
SLES-12-030365 V2R11 The SUSE operating system must not be performing Internet Protocol version 6 (IPv6) packet forwarding by default unless the system is a router.
SLES-12-010109 V2R11 The SUSE operating system must specify the default "include" directory for the /etc/sudoers file.
SLES-12-010221 V2R11 The SUSE operating system must not have accounts configured with blank or null passwords.
RHEL-08-010000 V1R3 RHEL 8 must be a vendor-supported release.
RHEL-08-010010 V1R3 RHEL 8 vendor packaged system security patches and updates must be installed and up to date.
RHEL-08-010292 V1R3 RHEL 8 must ensure the SSH server uses strong entropy.
RHEL-08-010460 V1R3 There must be no shosts.equiv files on the RHEL 8 operating system.
RHEL-08-010470 V1R3 There must be no .shosts files on the RHEL 8 operating system.
RHEL-08-010471 V1R3 RHEL 8 must enable the hardware random number generator entropy gatherer service.
RHEL-08-010480 V1R3 The RHEL 8 SSH public host key files must have mode 0644 or less permissive.
RHEL-08-010490 V1R3 The RHEL 8 SSH private host key files must have mode 0600 or less permissive.
RHEL-08-010500 V1R3 The RHEL 8 SSH daemon must perform strict mode checking of home directory configuration files.
RHEL-08-010510 V1R3 The RHEL 8 SSH daemon must not allow compression or must only allow compression after successful authentication.
RHEL-08-010520 V1R3 The RHEL 8 SSH daemon must not allow authentication using known host’s authentication.
RHEL-08-010521 V1R3 The RHEL 8 SSH daemon must not allow Kerberos authentication, except to fulfill documented and validated mission requirements.
RHEL-08-010540 V1R3 RHEL 8 must use a separate file system for /var.
RHEL-08-010541 V1R3 RHEL 8 must use a separate file system for /var/log.
RHEL-08-010542 V1R3 RHEL 8 must use a separate file system for the system audit data path.
RHEL-08-010543 V1R3 A separate RHEL 8 filesystem must be used for the /tmp directory.
RHEL-08-010560 V1R3 The auditd service must be running in RHEL 8.
RHEL-08-010561 V1R3 The rsyslog service must be running in RHEL 8.
RHEL-08-010570 V1R3 RHEL 8 must prevent files with the setuid and setgid bit set from being executed on file systems that contain user home directories.
RHEL-08-010571 V1R3 RHEL 8 must prevent files with the setuid and setgid bit set from being executed on the /boot directory.
RHEL-08-010580 V1R3 RHEL 8 must prevent special devices on non-root local partitions.
RHEL-08-010590 V1R3 RHEL 8 must prevent code from being executed on file systems that contain user home directories.
RHEL-08-010600 V1R3 RHEL 8 must prevent special devices on file systems that are used with removable media.
RHEL-08-010610 V1R3 RHEL 8 must prevent code from being executed on file systems that are used with removable media.
RHEL-08-010620 V1R3 RHEL 8 must prevent files with the setuid and setgid bit set from being executed on file systems that are used with removable media.
RHEL-08-010630 V1R3 RHEL 8 must prevent code from being executed on file systems that are imported via Network File System (NFS).
RHEL-08-010640 V1R3 RHEL 8 must prevent special devices on file systems that are imported via Network File System (NFS).
RHEL-08-010650 V1R3 RHEL 8 must prevent files with the setuid and setgid bit set from being executed on file systems that are imported via Network File System (NFS).
RHEL-08-010660 V1R3 Local RHEL 8 initialization files must not execute world-writable programs.
RHEL-08-010670 V1R3 RHEL 8 must disable kernel dumps unless needed.
RHEL-08-010671 V1R3 RHEL 8 must disable the kernel.core_pattern.
RHEL-08-010672 V1R3 RHEL 8 must disable acquiring, saving, and processing core dumps.
RHEL-08-010673 V1R3 RHEL 8 must disable core dumps for all users.
RHEL-08-010674 V1R3 RHEL 8 must disable storing core dumps.
RHEL-08-010675 V1R3 RHEL 8 must disable core dump backtraces.
RHEL-08-010680 V1R3 For RHEL 8 systems using Domain Name Servers (DNS) resolution, at least two name servers must be configured.
RHEL-08-010690 V1R3 Executable search paths within the initialization files of all local interactive RHEL 8 users must only contain paths that resolve to the system default or the users home directory.
RHEL-08-010700 V1R3 All RHEL 8 world-writable directories must be owned by root, sys, bin, or an application user.
RHEL-08-010710 V1R3 All RHEL 8 world-writable directories must be group-owned by root, sys, bin, or an application group.
RHEL-08-010720 V1R3 All RHEL 8 local interactive users must have a home directory assigned in the /etc/passwd file.
RHEL-08-010730 V1R3 All RHEL 8 local interactive user home directories must have mode 0750 or less permissive.
RHEL-08-010740 V1R3 All RHEL 8 local interactive user home directories must be group-owned by the home directory owner’s primary group.
RHEL-08-010750 V1R3 All RHEL 8 local interactive user home directories defined in the /etc/passwd file must exist.
RHEL-08-010760 V1R3 All RHEL 8 local interactive user accounts must be assigned a home directory upon creation.
RHEL-08-010770 V1R3 All RHEL 8 local initialization files must have mode 0740 or less permissive.
RHEL-08-010780 V1R3 All RHEL 8 local files and directories must have a valid owner.
RHEL-08-010790 V1R3 All RHEL 8 local files and directories must have a valid group owner.
RHEL-08-010800 V1R3 A separate RHEL 8 filesystem must be used for user home directories (such as /home or an equivalent).
RHEL-08-020320 V1R3 RHEL 8 must not have unnecessary accounts.
RHEL-08-020330 V1R3 RHEL 8 must not allow accounts configured with blank or null passwords.
RHEL-08-020340 V1R3 RHEL 8 must display the date and time of the last successful account logon upon logon.
RHEL-08-020350 V1R3 RHEL 8 must display the date and time of the last successful account logon upon an SSH logon.
RHEL-08-020353 V1R3 RHEL 8 must define default permissions for logon and non-logon shells.
RHEL-08-030010 V1R3 Cron logging must be implemented in RHEL 8.
RHEL-08-030061 V1R3 The RHEL 8 audit system must audit local events.
RHEL-08-030063 V1R3 RHEL 8 must resolve audit information before writing to disk.
RHEL-08-030670 V1R3 RHEL 8 must have the packages required for offloading audit logs installed.
RHEL-08-030680 V1R3 RHEL 8 must have the packages required for encrypting offloaded audit logs installed.
RHEL-08-040170 V1R3 The x86 Ctrl-Alt-Delete key sequence must be disabled on RHEL 8.
RHEL-08-040171 V1R3 The x86 Ctrl-Alt-Delete key sequence in RHEL 8 must be disabled if a graphical user interface is installed.
RHEL-08-040172 V1R3 The systemd Ctrl-Alt-Delete burst key sequence in RHEL 8 must be disabled.
RHEL-08-040180 V1R3 The debug-shell systemd service must be disabled on RHEL 8.
RHEL-08-040190 V1R3 The Trivial File Transfer Protocol (TFTP) server package must not be installed if not required for RHEL 8 operational support.
RHEL-08-040200 V1R3 The root account must be the only account having unrestricted access to the RHEL 8 system.
RHEL-08-040210 V1R3 RHEL 8 must prevent IPv6 Internet Control Message Protocol (ICMP) redirect messages from being accepted.
RHEL-08-040220 V1R3 RHEL 8 must not send Internet Control Message Protocol (ICMP) redirects.
RHEL-08-040230 V1R3 RHEL 8 must not respond to Internet Control Message Protocol (ICMP) echoes sent to a broadcast address.
RHEL-08-040240 V1R3 RHEL 8 must not forward IPv6 source-routed packets.
RHEL-08-040250 V1R3 RHEL 8 must not forward IPv6 source-routed packets by default.
RHEL-08-040260 V1R3 RHEL 8 must not be performing packet forwarding unless the system is a router.
RHEL-08-040261 V1R3 RHEL 8 must not accept router advertisements on all IPv6 interfaces.
RHEL-08-040262 V1R3 RHEL 8 must not accept router advertisements on all IPv6 interfaces by default.
RHEL-08-040270 V1R3 RHEL 8 must not allow interfaces to perform Internet Control Message Protocol (ICMP) redirects by default.
RHEL-08-040280 V1R3 RHEL 8 must ignore IPv6 Internet Control Message Protocol (ICMP) redirect messages.
RHEL-08-040281 V1R3 RHEL 8 must disable access to network bpf syscall from unprivileged processes.
RHEL-08-040282 V1R3 RHEL 8 must restrict usage of ptrace to descendant processes.
RHEL-08-040283 V1R3 RHEL 8 must restrict exposed kernel pointer addresses access.
RHEL-08-040284 V1R3 RHEL 8 must disable the use of user namespaces.
RHEL-08-040285 V1R3 RHEL 8 must use reverse path filtering on all IPv4 interfaces.
RHEL-08-040290 V1R3 RHEL 8 must be configured to prevent unrestricted mail relaying.
RHEL-08-040300 V1R3 The RHEL 8 file integrity tool must be configured to verify extended attributes.
RHEL-08-040310 V1R3 The RHEL 8 file integrity tool must be configured to verify Access Control Lists (ACLs).
RHEL-08-040320 V1R3 The graphical display manager must not be installed on RHEL 8 unless approved.
RHEL-08-040330 V1R3 RHEL 8 network interfaces must not be in promiscuous mode.
RHEL-08-040340 V1R3 RHEL 8 remote X connections for interactive users must be disabled unless to fulfill documented and validated mission requirements.
RHEL-08-040341 V1R3 The RHEL 8 SSH daemon must prevent remote hosts from connecting to the proxy display.
RHEL-08-040350 V1R3 If the Trivial File Transfer Protocol (TFTP) server is required, the RHEL 8 TFTP daemon must be configured to operate in secure mode.
RHEL-08-040360 V1R3 A File Transfer Protocol (FTP) server package must not be installed unless mission essential on RHEL 8.
RHEL-08-040370 V1R3 The gssproxy package must not be installed unless mission essential on RHEL 8.
RHEL-08-040380 V1R3 The iprutils package must not be installed unless mission essential on RHEL 8.
RHEL-08-040390 V1R3 The tuned package must not be installed unless mission essential on RHEL 8.
RHEL-08-010382 V1R3 RHEL 8 must restrict privilege elevation to authorized personnel.
RHEL-08-010383 V1R3 RHEL 8 must use the invoking user's password for privilege escalation when using "sudo".
RHEL-08-010472 V1R3 RHEL 8 must have the packages required to use the hardware random number generator entropy gatherer service.
RHEL-08-010522 V1R3 The RHEL 8 SSH daemon must not allow GSSAPI authentication, except to fulfill documented and validated mission requirements.
RHEL-08-010544 V1R3 RHEL 8 must use a separate file system for /var/tmp.
RHEL-08-010572 V1R3 RHEL 8 must prevent files with the setuid and setgid bit set from being executed on the /boot/efi directory.
RHEL-08-010731 V1R3 All RHEL 8 local interactive user home directory files must have mode 0750 or less permissive.
RHEL-08-010741 V1R3 RHEL 8 must be configured so that all files and directories contained in local interactive user home directories are group-owned by a group of which the home directory owner is a member.
RHEL-08-020032 V1R3 RHEL 8 must disable the user list at logon for graphical user interfaces.
RHEL-08-020331 V1R3 RHEL 8 must not allow blank or null passwords in the system-auth file.
RHEL-08-020332 V1R3 RHEL 8 must not allow blank or null passwords in the password-auth file.
RHEL-08-040209 V1R3 RHEL 8 must prevent IPv4 Internet Control Message Protocol (ICMP) redirect messages from being accepted.
RHEL-08-040239 V1R3 RHEL 8 must not forward IPv4 source-routed packets.
RHEL-08-040249 V1R3 RHEL 8 must not forward IPv4 source-routed packets by default.
RHEL-08-040279 V1R3 RHEL 8 must ignore IPv4 Internet Control Message Protocol (ICMP) redirect messages.
RHEL-08-040286 V1R3 RHEL 8 must enable hardening for the Berkeley Packet Filter Just-in-time compiler.
UBTU-20-010048 V1R12 The Ubuntu operating system must be configured so that remote X connections are disabled, unless to fulfill documented and validated mission requirements.
UBTU-20-010049 V1R12 The Ubuntu operating system SSH daemon must prevent remote hosts from connecting to the proxy display.
UBTU-20-010453 V1R12 The Ubuntu operating system must display the date and time of the last successful account logon upon logon.
UBTU-20-010459 V1R12 The Ubuntu operating system must disable the x86 Ctrl-Alt-Delete key sequence if a graphical user interface is installed.
UBTU-20-010460 V1R12 The Ubuntu operating system must disable the x86 Ctrl-Alt-Delete key sequence.
UBTU-20-010462 V1R12 The Ubuntu operating system must not have accounts configured with blank or null passwords.
UBTU-20-010463 V1R12 The Ubuntu operating system must not allow accounts configured with blank or null passwords.
SLES-15-010000 V1R12 The SUSE operating system must be a vendor-supported release.
SLES-15-010010 V1R12 Vendor-packaged SUSE operating system security patches and updates must be installed and up to date.
SLES-15-020080 V1R12 The SUSE operating system must display the date and time of the last successful account logon upon logon.
SLES-15-020090 V1R12 The SUSE operating system must not have unnecessary accounts.
SLES-15-020091 V1R12 The SUSE operating system must not have unnecessary account capabilities.
SLES-15-020100 V1R12 The SUSE operating system root account must be the only account with unrestricted access to the system.
SLES-15-020101 V1R12 The SUSE operating system must restrict privilege elevation to authorized personnel.
SLES-15-020103 V1R12 The SUSE operating system must use the invoking user's password for privilege escalation when using "sudo".
SLES-15-020110 V1R12 All SUSE operating system local interactive user accounts, upon creation, must be assigned a home directory.
SLES-15-020120 V1R12 The SUSE operating system must display the date and time of the last successful account logon upon an SSH logon.
SLES-15-020300 V1R12 The SUSE operating system must not be configured to allow blank or null passwords.
SLES-15-030810 V1R12 The SUSE operating system must use a separate file system for the system audit data path.
SLES-15-030820 V1R12 The SUSE operating system must not disable syscall auditing.
SLES-15-040020 V1R12 There must be no .shosts files on the SUSE operating system.
SLES-15-040030 V1R12 There must be no shosts.equiv files on the SUSE operating system.
SLES-15-040040 V1R12 The SUSE operating system file integrity tool must be configured to verify Access Control Lists (ACLs).
SLES-15-040050 V1R12 The SUSE operating system file integrity tool must be configured to verify extended attributes.
SLES-15-040060 V1R12 The SUSE operating system must disable the x86 Ctrl-Alt-Delete key sequence.
SLES-15-040061 V1R12 The SUSE operating system must disable the x86 Ctrl-Alt-Delete key sequence for Graphical User Interfaces.
SLES-15-040062 V1R12 The SUSE operating system must disable the systemd Ctrl-Alt-Delete burst key sequence.
SLES-15-040070 V1R12 All SUSE operating system local interactive users must have a home directory assigned in the /etc/passwd file.
SLES-15-040080 V1R12 All SUSE operating system local interactive user home directories defined in the /etc/passwd file must exist.
SLES-15-040090 V1R12 All SUSE operating system local interactive user home directories must have mode 0750 or less permissive.
SLES-15-040100 V1R12 All SUSE operating system local interactive user home directories must be group-owned by the home directory owner's primary group.
SLES-15-040110 V1R12 All SUSE operating system local initialization files must have mode 0740 or less permissive.
SLES-15-040120 V1R12 All SUSE operating system local interactive user initialization files executable search paths must contain only paths that resolve to the users home directory.
SLES-15-040130 V1R12 All SUSE operating system local initialization files must not execute world-writable programs.
SLES-15-040140 V1R12 SUSE operating system file systems that contain user home directories must be mounted to prevent files with the setuid and setgid bit set from being executed.
SLES-15-040150 V1R12 SUSE operating system file systems that are used with removable media must be mounted to prevent files with the setuid and setgid bit set from being executed.
SLES-15-040160 V1R12 SUSE operating system file systems that are being imported via Network File System (NFS) must be mounted to prevent files with the setuid and setgid bit set from being executed.
SLES-15-040170 V1R12 SUSE operating system file systems that are being imported via Network File System (NFS) must be mounted to prevent binary files from being executed.
SLES-15-040180 V1R12 All SUSE operating system world-writable directories must be group-owned by root, sys, bin, or an application group.
SLES-15-040190 V1R12 SUSE operating system kernel core dumps must be disabled unless needed.
SLES-15-040200 V1R12 A separate file system must be used for SUSE operating system user home directories (such as /home or an equivalent).
SLES-15-040210 V1R12 The SUSE operating system must use a separate file system for /var.
SLES-15-040220 V1R12 The SUSE operating system must be configured to not overwrite Pluggable Authentication Modules (PAM) configuration on package changes.
SLES-15-040230 V1R12 The SUSE operating system SSH daemon must be configured to not allow authentication using known hosts authentication.
SLES-15-040240 V1R12 The SUSE operating system SSH daemon public host key files must have mode 0644 or less permissive.
SLES-15-040250 V1R12 The SUSE operating system SSH daemon private host key files must have mode 0640 or less permissive.
SLES-15-040260 V1R12 The SUSE operating system SSH daemon must perform strict mode checking of home directory configuration files.
SLES-15-040290 V1R12 The SUSE operating system SSH daemon must disable forwarded remote X connections for interactive users, unless to fulfill documented and validated mission requirements.
SLES-15-040300 V1R12 The SUSE operating system must not forward Internet Protocol version 4 (IPv4) source-routed packets.
SLES-15-040310 V1R12 The SUSE operating system must not forward Internet Protocol version 6 (IPv6) source-routed packets.
SLES-15-040320 V1R12 The SUSE operating system must not forward Internet Protocol version 4 (IPv4) source-routed packets by default.
SLES-15-040321 V1R12 The SUSE operating system must not forward Internet Protocol version 6 (IPv6) source-routed packets by default.
SLES-15-040330 V1R12 The SUSE operating system must prevent Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirect messages from being accepted.
SLES-15-040340 V1R12 The SUSE operating system must not allow interfaces to accept Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirect messages by default.
SLES-15-040341 V1R12 The SUSE operating system must prevent Internet Protocol version 6 (IPv6) Internet Control Message Protocol (ICMP) redirect messages from being accepted.
SLES-15-040350 V1R12 The SUSE operating system must not allow interfaces to accept Internet Protocol version 6 (IPv6) Internet Control Message Protocol (ICMP) redirect messages by default.
SLES-15-040360 V1R12 The SUSE operating system must not allow interfaces to send Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirect messages by default.
SLES-15-040370 V1R12 The SUSE operating system must not send Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirects.
SLES-15-040380 V1R12 The SUSE operating system must not be performing Internet Protocol version 4 (IPv4) packet forwarding unless the system is a router.
SLES-15-040381 V1R12 The SUSE operating system must not be performing Internet Protocol version 6 (IPv6) packet forwarding unless the system is a router.
SLES-15-040382 V1R12 The SUSE operating system must not be performing Internet Protocol version 6 (IPv6) packet forwarding by default unless the system is a router.
SLES-15-040390 V1R12 The SUSE operating system must not have network interfaces in promiscuous mode unless approved and documented.
SLES-15-040400 V1R12 All SUSE operating system files and directories must have a valid owner.
SLES-15-040410 V1R12 All SUSE operating system files and directories must have a valid group owner.
SLES-15-020099 V1R12 The SUSE operating system must specify the default "include" directory for the /etc/sudoers file.
SLES-15-020181 V1R12 The SUSE operating system must not have accounts configured with blank or null passwords.
WN11-00-000005 V2R2 Domain-joined systems must use Windows 11 Enterprise Edition 64-bit version.
WN11-00-000040 V2R2 Windows 11 systems must be maintained at a supported servicing level.
WN11-00-000045 V2R2 The Windows 11 system must use an antivirus program.
WN11-00-000055 V2R2 Alternate operating systems must not be permitted on the same system.
WN11-00-000075 V2R2 Only accounts responsible for the backup operations must be members of the Backup Operators group.
WN11-00-000085 V2R2 Standard local user accounts must not exist on a system in a domain.
WN11-00-000130 V2R2 Software certificate installation files must be removed from Windows 11.
WN11-00-000135 V2R2 A host-based firewall must be installed and enabled on the system.
WN11-00-000190 V2R2 Orphaned security identifiers (SIDs) must be removed from user rights on Windows 11.
WN11-00-000230 V2R2 The system must notify the user when a Bluetooth device attempts to connect.
WN11-00-000240 V2R2 Administrative accounts must not be used with applications that access the internet, such as web browsers, or with potential internet sources, such as email.
WN11-CC-000020 V2R2 IPv6 source routing must be configured to highest protection.
WN11-CC-000025 V2R2 The system must be configured to prevent IP source routing.
WN11-CC-000030 V2R2 The system must be configured to prevent Internet Control Message Protocol (ICMP) redirects from overriding Open Shortest Path First (OSPF) generated routes.
WN11-CC-000040 V2R2 Insecure logons to an SMB server must be disabled.
WN11-CC-000050 V2R2 Hardened UNC Paths must be defined to require mutual authentication and integrity for at least the \\*\SYSVOL and \\*\NETLOGON shares.
WN11-CC-000060 V2R2 Connections to non-domain networks when connected to a domain authenticated network must be blocked.
WN11-CC-000065 V2R2 Wi-Fi Sense must be disabled.
WN11-CC-000068 V2R2 Windows 11 must be configured to enable Remote host allows delegation of non-exportable credentials.
WN11-CC-000070 V2R2 Virtualization-based Security must be enabled on Windows 11 with the platform security level configured to Secure Boot or Secure Boot with DMA Protection.
WN11-CC-000075 V2R2 Credential Guard must be running on Windows 11 domain-joined systems.
WN11-CC-000080 V2R2 Virtualization-based protection of code integrity must be enabled.
WN11-CC-000085 V2R2 Early Launch Antimalware, Boot-Start Driver Initialization Policy must prevent boot drivers.
WN11-CC-000090 V2R2 Group Policy objects must be reprocessed even if they have not changed.
WN11-CC-000115 V2R2 Systems must at least attempt device authentication using certificates.
WN11-CC-000170 V2R2 The setting to allow Microsoft accounts to be optional for modern style apps must be enabled.
WN11-CC-000195 V2R2 Enhanced anti-spoofing for facial recognition must be enabled on Windows 11.
WN11-CC-000204 V2R2 Enhanced diagnostic data must be limited to the minimum required to support Windows Analytics.
WN11-CC-000206 V2R2 Windows Update must not obtain updates from other PCs on the internet.
WN11-CC-000225 V2R2 File Explorer shell protocol must run in protected mode.
WN11-CC-000255 V2R2 The use of a hardware security device with Windows Hello for Business must be enabled.
WN11-CC-000260 V2R2 Windows 11 must be configured to require a minimum pin length of six characters or greater.
WN11-CC-000295 V2R2 Attachments must be prevented from being downloaded from RSS feeds.
WN11-CC-000320 V2R2 Users must be notified if a web-based program attempts to install software.
WN11-SO-000015 V2R2 Local accounts with blank passwords must be restricted to prevent access from the network.
WN11-SO-000020 V2R2 The built-in administrator account must be renamed.
WN11-SO-000025 V2R2 The built-in guest account must be renamed.
WN11-SO-000050 V2R2 The computer account password must not be prevented from being reset.
WN11-SO-000055 V2R2 The maximum age for machine account passwords must be configured to 30 days or less.
WN11-SO-000085 V2R2 Caching of logon credentials must be limited.
WN11-SO-000095 V2R2 The Smart Card removal option must be configured to Force Logoff or Lock Workstation.
WN11-SO-000140 V2R2 Anonymous SID/Name translation must not be allowed.
WN11-SO-000145 V2R2 Anonymous enumeration of SAM accounts must not be allowed.
WN11-SO-000160 V2R2 The system must be configured to prevent anonymous users from having the same rights as the Everyone group.
WN11-SO-000180 V2R2 NTLM must be prevented from falling back to a Null session.
WN11-SO-000185 V2R2 PKU2U authentication using online identities must be prevented.
WN11-SO-000205 V2R2 The LanMan authentication level must be set to send NTLMv2 response only, and to refuse LM and NTLM.
WN11-SO-000210 V2R2 The system must be configured to the required LDAP client signing level.
WN11-SO-000215 V2R2 The system must be configured to meet the minimum session security requirement for NTLM SSP based clients.
WN11-SO-000220 V2R2 The system must be configured to meet the minimum session security requirement for NTLM SSP based servers.
WN11-SO-000240 V2R2 The default permissions of global system objects must be increased.
WN11-UC-000020 V2R2 Zone information must be preserved when saving attachments.
WN11-00-000395 V2R2 Windows 11 must not have portproxy enabled or in use.
WN11-CC-000063 V2R2 Windows 11 systems must use either Group Policy or an approved Mobile Device Management (MDM) product to enforce STIG compliance.
WN10-00-000005 V3R2 Domain-joined systems must use Windows 10 Enterprise Edition 64-bit version.
WN10-00-000010 V3R2 Windows 10 domain-joined systems must have a Trusted Platform Module (TPM) enabled and ready for use.
WN10-00-000015 V3R2 Windows 10 systems must have Unified Extensible Firmware Interface (UEFI) firmware and be configured to run in UEFI mode, not Legacy BIOS.
WN10-00-000020 V3R2 Secure Boot must be enabled on Windows 10 systems.
WN10-00-000040 V3R2 Windows 10 systems must be maintained at a supported servicing level.
WN10-00-000045 V3R2 The Windows 10 system must use an anti-virus program.
WN10-00-000055 V3R2 Alternate operating systems must not be permitted on the same system.
WN10-00-000075 V3R2 Only accounts responsible for the backup operations must be members of the Backup Operators group.
WN10-00-000085 V3R2 Standard local user accounts must not exist on a system in a domain.
WN10-00-000130 V3R2 Software certificate installation files must be removed from Windows 10.
WN10-00-000135 V3R2 A host-based firewall must be installed and enabled on the system.
WN10-00-000140 V3R2 Inbound exceptions to the firewall on Windows 10 domain workstations must only allow authorized remote management hosts.
WN10-00-000190 V3R2 Orphaned security identifiers (SIDs) must be removed from user rights on Windows 10.
WN10-00-000230 V3R2 The system must notify the user when a Bluetooth device attempts to connect.
WN10-00-000240 V3R2 Administrative accounts must not be used with applications that access the Internet, such as web browsers, or with potential Internet sources, such as email.
WN10-CC-000020 V3R2 IPv6 source routing must be configured to highest protection.
WN10-CC-000025 V3R2 The system must be configured to prevent IP source routing.
WN10-CC-000030 V3R2 The system must be configured to prevent Internet Control Message Protocol (ICMP) redirects from overriding Open Shortest Path First (OSPF) generated routes.
WN10-CC-000040 V3R2 Insecure logons to an SMB server must be disabled.
WN10-CC-000055 V3R2 Simultaneous connections to the internet or a Windows domain must be limited.
WN10-CC-000060 V3R2 Connections to non-domain networks when connected to a domain authenticated network must be blocked.
WN10-CC-000065 V3R2 Wi-Fi Sense must be disabled.
WN10-CC-000068 V3R2 Windows 10 must be configured to enable Remote host allows delegation of non-exportable credentials.
WN10-CC-000070 V3R2 Virtualization Based Security must be enabled on Windows 10 with the platform security level configured to Secure Boot or Secure Boot with DMA Protection.
WN10-CC-000075 V3R2 Credential Guard must be running on Windows 10 domain-joined systems.
WN10-CC-000085 V3R2 Early Launch Antimalware, Boot-Start Driver Initialization Policy must prevent boot drivers.
WN10-CC-000090 V3R2 Group Policy objects must be reprocessed even if they have not changed.
WN10-CC-000115 V3R2 Systems must at least attempt device authentication using certificates.
WN10-CC-000170 V3R2 The setting to allow Microsoft accounts to be optional for modern style apps must be enabled.
WN10-CC-000195 V3R2 Enhanced anti-spoofing for facial recognition must be enabled on Window 10.
WN10-CC-000204 V3R2 If Enhanced diagnostic data is enabled it must be limited to the minimum required to support Windows Analytics.
WN10-CC-000205 V3R2 Windows Telemetry must not be configured to Full.
WN10-CC-000206 V3R2 Windows Update must not obtain updates from other PCs on the internet.
WN10-CC-000225 V3R2 File Explorer shell protocol must run in protected mode.
WN10-CC-000230 V3R2 Users must not be allowed to ignore Windows Defender SmartScreen filter warnings for malicious websites in Microsoft Edge.
WN10-CC-000235 V3R2 Users must not be allowed to ignore Windows Defender SmartScreen filter warnings for unverified files in Microsoft Edge.
WN10-CC-000238 V3R2 Windows 10 must be configured to prevent certificate error overrides in Microsoft Edge.
WN10-CC-000245 V3R2 The password manager function in the Edge browser must be disabled.
WN10-CC-000250 V3R2 The Windows Defender SmartScreen filter for Microsoft Edge must be enabled.
WN10-CC-000255 V3R2 The use of a hardware security device with Windows Hello for Business must be enabled.
WN10-CC-000260 V3R2 Windows 10 must be configured to require a minimum pin length of six characters or greater.
WN10-CC-000295 V3R2 Attachments must be prevented from being downloaded from RSS feeds.
WN10-CC-000320 V3R2 Users must be notified if a web-based program attempts to install software.
WN10-SO-000015 V3R2 Local accounts with blank passwords must be restricted to prevent access from the network.
WN10-SO-000020 V3R2 The built-in administrator account must be renamed.
WN10-SO-000025 V3R2 The built-in guest account must be renamed.
WN10-SO-000050 V3R2 The computer account password must not be prevented from being reset.
WN10-SO-000055 V3R2 The maximum age for machine account passwords must be configured to 30 days or less.
WN10-SO-000085 V3R2 Caching of logon credentials must be limited.
WN10-SO-000095 V3R2 The Smart Card removal option must be configured to Force Logoff or Lock Workstation.
WN10-SO-000140 V3R2 Anonymous SID/Name translation must not be allowed.
WN10-SO-000145 V3R2 Anonymous enumeration of SAM accounts must not be allowed.
WN10-SO-000160 V3R2 The system must be configured to prevent anonymous users from having the same rights as the Everyone group.
WN10-SO-000180 V3R2 NTLM must be prevented from falling back to a Null session.
WN10-SO-000185 V3R2 PKU2U authentication using online identities must be prevented.
WN10-SO-000205 V3R2 The LanMan authentication level must be set to send NTLMv2 response only, and to refuse LM and NTLM.
WN10-SO-000210 V3R2 The system must be configured to the required LDAP client signing level.
WN10-SO-000215 V3R2 The system must be configured to meet the minimum session security requirement for NTLM SSP based clients.
WN10-SO-000220 V3R2 The system must be configured to meet the minimum session security requirement for NTLM SSP based servers.
WN10-SO-000240 V3R2 The default permissions of global system objects must be increased.
WN10-UC-000020 V3R2 Zone information must be preserved when saving attachments.
WN10-CC-000050 V3R2 Hardened UNC paths must be defined to require mutual authentication and integrity for at least the \\*\SYSVOL and \\*\NETLOGON shares.
WN10-CC-000080 V3R2 Virtualization-based protection of code integrity must be enabled.
WN10-00-000395 V3R2 Windows 10 must not have portproxy enabled or in use.
WN10-CC-000063 V3R2 Windows 10 systems must use either Group Policy or an approved Mobile Device Management (MDM) product to enforce STIG compliance.
WN19-00-000010 V3R2 Windows Server 2019 users with Administrative privileges must have separate accounts for administrative duties and normal operational tasks.
WN19-00-000030 V3R2 Windows Server 2019 administrative accounts must not be used with applications that access the Internet, such as web browsers, or with potential Internet sources, such as email.
WN19-00-000040 V3R2 Windows Server 2019 members of the Backup Operators group must have separate accounts for backup duties and normal operational tasks.
WN19-00-000060 V3R2 Windows Server 2019 manually managed application account passwords must be changed at least annually or when a system administrator with knowledge of the password leaves the organization.
WN19-00-000090 V3R2 Windows Server 2019 domain-joined systems must have a Trusted Platform Module (TPM) enabled and ready for use.
WN19-00-000100 V3R2 Windows Server 2019 must be maintained at a supported servicing level.
WN19-00-000110 V3R2 Windows Server 2019 must use an anti-virus program.
WN19-00-000120 V3R2 Windows Server 2019 must have a host-based intrusion detection or prevention system.
WN19-00-000240 V3R2 Windows Server 2019 must have software certificate installation files removed.
WN19-00-000420 V3R2 Windows Server 2019 FTP servers must be configured to prevent anonymous logons.
WN19-00-000430 V3R2 Windows Server 2019 FTP servers must be configured to prevent access to the system drive.
WN19-00-000450 V3R2 Windows Server 2019 must have orphaned security identifiers (SIDs) removed from user rights.
WN19-00-000460 V3R2 Windows Server 2019 systems must have Unified Extensible Firmware Interface (UEFI) firmware and be configured to run in UEFI mode, not Legacy BIOS.
WN19-00-000470 V3R2 Windows Server 2019 must have Secure Boot enabled.
WN19-CC-000030 V3R2 Windows Server 2019 Internet Protocol version 6 (IPv6) source routing must be configured to the highest protection level to prevent IP source routing.
WN19-CC-000040 V3R2 Windows Server 2019 source routing must be configured to the highest protection level to prevent Internet Protocol (IP) source routing.
WN19-CC-000050 V3R2 Windows Server 2019 must be configured to prevent Internet Control Message Protocol (ICMP) redirects from overriding Open Shortest Path First (OSPF)-generated routes.
WN19-CC-000070 V3R2 Windows Server 2019 insecure logons to an SMB server must be disabled.
WN19-CC-000080 V3R2 Windows Server 2019 hardened Universal Naming Convention (UNC) paths must be defined to require mutual authentication and integrity for at least the \\*\SYSVOL and \\*\NETLOGON shares.
WN19-CC-000100 V3R2 Windows Server 2019 must be configured to enable Remote host allows delegation of non-exportable credentials.
WN19-CC-000110 V3R2 Windows Server 2019 virtualization-based security must be enabled with the platform security level configured to Secure Boot or Secure Boot with DMA Protection.
WN19-CC-000130 V3R2 Windows Server 2019 Early Launch Antimalware, Boot-Start Driver Initialization Policy must prevent boot drivers identified as bad.
WN19-CC-000140 V3R2 Windows Server 2019 group policy objects must be reprocessed even if they have not changed.
WN19-CC-000180 V3R2 Windows Server 2019 users must be prompted to authenticate when the system wakes from sleep (on battery).
WN19-CC-000190 V3R2 Windows Server 2019 users must be prompted to authenticate when the system wakes from sleep (plugged in).
WN19-CC-000250 V3R2 Windows Server 2019 Telemetry must be configured to Security or Basic.
WN19-CC-000260 V3R2 Windows Server 2019 Windows Update must not obtain updates from other PCs on the Internet.
WN19-CC-000320 V3R2 Windows Server 2019 Turning off File Explorer heap termination on corruption must be disabled.
WN19-CC-000330 V3R2 Windows Server 2019 File Explorer shell protocol must run in protected mode.
WN19-CC-000390 V3R2 Windows Server 2019 must prevent attachments from being downloaded from RSS feeds.
WN19-CC-000440 V3R2 Windows Server 2019 users must be notified if a web-based program attempts to install software.
WN19-DC-000150 V3R2 Windows Server 2019 directory data (outside the root DSE) of a non-public directory must be configured to prevent anonymous access.
WN19-DC-000330 V3R2 Windows Server 2019 domain controllers must be configured to allow reset of machine account passwords.
WN19-DC-000430 V3R2 The password for the krbtgt account on a domain must be reset at least every 180 days.
WN19-MS-000050 V3R2 Windows Server 2019 must limit the caching of logon credentials to four or less on domain-joined member servers.
WN19-MS-000140 V3R2 Windows Server 2019 must be running Credential Guard on domain-joined member servers.
WN19-SO-000020 V3R2 Windows Server 2019 must prevent local accounts with blank passwords from being used from the network.
WN19-SO-000030 V3R2 Windows Server 2019 built-in administrator account must be renamed.
WN19-SO-000040 V3R2 Windows Server 2019 built-in guest account must be renamed.
WN19-SO-000100 V3R2 Windows Server 2019 maximum age for machine account passwords must be configured to 30 days or less.
WN19-SO-000150 V3R2 Windows Server 2019 Smart Card removal option must be configured to Force Logoff or Lock Workstation.
WN19-SO-000210 V3R2 Windows Server 2019 must not allow anonymous SID/Name translation.
WN19-SO-000220 V3R2 Windows Server 2019 must not allow anonymous enumeration of Security Account Manager (SAM) accounts.
WN19-SO-000240 V3R2 Windows Server 2019 must be configured to prevent anonymous users from having the same permissions as the Everyone group.
WN19-SO-000260 V3R2 Windows Server 2019 services using Local System that use Negotiate when reverting to NTLM authentication must use the computer identity instead of authenticating anonymously.
WN19-SO-000270 V3R2 Windows Server 2019 must prevent NTLM from falling back to a Null session.
WN19-SO-000280 V3R2 Windows Server 2019 must prevent PKU2U authentication using online identities.
WN19-SO-000310 V3R2 Windows Server 2019 LAN Manager authentication level must be configured to send NTLMv2 response only and to refuse LM and NTLM.
WN19-SO-000320 V3R2 Windows Server 2019 must be configured to at least negotiate signing for LDAP client signing.
WN19-SO-000330 V3R2 Windows Server 2019 session security for NTLM SSP-based clients must be configured to require NTLMv2 session security and 128-bit encryption.
WN19-SO-000340 V3R2 Windows Server 2019 session security for NTLM SSP-based servers must be configured to require NTLMv2 session security and 128-bit encryption.
WN19-SO-000370 V3R2 Windows Server 2019 default permissions of global system objects must be strengthened.
WN19-UC-000010 V3R2 Windows Server 2019 must preserve zone information when saving attachments.
WN19-00-000280 V3R2 Windows Server 2019 must have a host-based firewall installed and enabled.
UBTU-22-211015 V2R2 Ubuntu 22.04 LTS must disable the x86 Ctrl-Alt-Delete key sequence.
UBTU-22-215015 V2R2 Ubuntu 22.04 LTS must have the "chrony" package installed.
UBTU-22-215020 V2R2 Ubuntu 22.04 LTS must not have the "systemd-timesyncd" package installed.
UBTU-22-215025 V2R2 Ubuntu 22.04 LTS must not have the "ntp" package installed.
UBTU-22-255040 V2R2 Ubuntu 22.04 LTS must be configured so that remote X connections are disabled, unless to fulfill documented and validated mission requirements.
UBTU-22-255045 V2R2 Ubuntu 22.04 LTS SSH daemon must prevent remote hosts from connecting to the proxy display.
UBTU-22-271030 V2R2 Ubuntu 22.04 LTS must disable the x86 Ctrl-Alt-Delete key sequence if a graphical user interface is installed.
UBTU-22-412015 V2R2 Ubuntu 22.04 LTS must display the date and time of the last successful account logon upon logon.
UBTU-22-611060 V2R2 Ubuntu 22.04 LTS must not allow accounts configured with blank or null passwords.
UBTU-22-611065 V2R2 Ubuntu 22.04 LTS must not have accounts configured with blank or null passwords.
UBTU-22-654190 V2R2 Ubuntu 22.04 LTS must generate audit records for all events that affect the systemd journal files.
WN16-00-000010 V2R7 Users with Administrative privileges must have separate accounts for administrative duties and normal operational tasks.
WN16-00-000040 V2R7 Administrative accounts must not be used with applications that access the Internet, such as web browsers, or with potential Internet sources, such as email.
WN16-00-000050 V2R7 Members of the Backup Operators group must have separate accounts for backup duties and normal operational tasks.
WN16-00-000070 V2R7 Manually managed application account passwords must be changed at least annually or when a system administrator with knowledge of the password leaves the organization.
WN16-00-000100 V2R7 Windows Server 2016 domain-joined systems must have a Trusted Platform Module (TPM) enabled and ready for use.
WN16-00-000110 V2R7 Systems must be maintained at a supported servicing level.
WN16-00-000120 V2R7 The Windows Server 2016 system must use an anti-virus program.
WN16-00-000140 V2R7 Servers must have a host-based intrusion detection or prevention system.
WN16-00-000270 V2R7 Software certificate installation files must be removed from Windows Server 2016.
WN16-00-000310 V2R7 A host-based firewall must be installed and enabled on the system.
WN16-00-000430 V2R7 FTP servers must be configured to prevent anonymous logons.
WN16-00-000440 V2R7 FTP servers must be configured to prevent access to the system drive.
WN16-00-000460 V2R7 Orphaned security identifiers (SIDs) must be removed from user rights on Windows 2016.
WN16-00-000470 V2R7 Secure Boot must be enabled on Windows Server 2016 systems.
WN16-00-000480 V2R7 Windows 2016 systems must have Unified Extensible Firmware Interface (UEFI) firmware and be configured to run in UEFI mode, not Legacy BIOS.
WN16-CC-000040 V2R7 Internet Protocol version 6 (IPv6) source routing must be configured to the highest protection level to prevent IP source routing.
WN16-CC-000050 V2R7 Source routing must be configured to the highest protection level to prevent Internet Protocol (IP) source routing.
WN16-CC-000060 V2R7 Windows Server 2016 must be configured to prevent Internet Control Message Protocol (ICMP) redirects from overriding Open Shortest Path First (OSPF)-generated routes.
WN16-CC-000080 V2R7 Insecure logons to an SMB server must be disabled.
WN16-CC-000090 V2R7 Hardened UNC paths must be defined to require mutual authentication and integrity for at least the \\*\SYSVOL and \\*\NETLOGON shares.
WN16-CC-000110 V2R7 Windows Server 2016 virtualization-based security must be enabled with the platform security level configured to Secure Boot or Secure Boot with DMA Protection.
WN16-CC-000140 V2R7 Early Launch Antimalware, Boot-Start Driver Initialization Policy must prevent boot drivers identified as bad.
WN16-CC-000150 V2R7 Group Policy objects must be reprocessed even if they have not changed.
WN16-CC-000210 V2R7 Users must be prompted to authenticate when the system wakes from sleep (on battery).
WN16-CC-000220 V2R7 Users must be prompted to authenticate when the system wakes from sleep (plugged in).
WN16-CC-000290 V2R7 Windows Telemetry must be configured to Security or Basic.
WN16-CC-000350 V2R7 Turning off File Explorer heap termination on corruption must be disabled.
WN16-CC-000360 V2R7 File Explorer shell protocol must run in protected mode.
WN16-CC-000420 V2R7 Attachments must be prevented from being downloaded from RSS feeds.
WN16-CC-000470 V2R7 Users must be notified if a web-based program attempts to install software.
WN16-DC-000150 V2R7 Directory data (outside the root DSE) of a non-public directory must be configured to prevent anonymous access.
WN16-DC-000330 V2R7 Domain controllers must be configured to allow reset of machine account passwords.
WN16-DC-000430 V2R7 The password for the krbtgt account on a domain must be reset at least every 180 days.
WN16-MS-000050 V2R7 Caching of logon credentials must be limited.
WN16-MS-000120 V2R7 Windows Server 2016 must be running Credential Guard on domain-joined member servers.
WN16-SO-000020 V2R7 Local accounts with blank passwords must be restricted to prevent access from the network.
WN16-SO-000030 V2R7 Windows Server 2016 built-in administrator account must be renamed.
WN16-SO-000040 V2R7 Windows Server 2016 built-in guest account must be renamed.
WN16-SO-000120 V2R7 The maximum age for machine account passwords must be configured to 30 days or less.
WN16-SO-000180 V2R7 The Smart Card removal option must be configured to Force Logoff or Lock Workstation.
WN16-SO-000250 V2R7 Anonymous SID/Name translation must not be allowed.
WN16-SO-000260 V2R7 Anonymous enumeration of Security Account Manager (SAM) accounts must not be allowed.
WN16-SO-000290 V2R7 Windows Server 2016 must be configured to prevent anonymous users from having the same permissions as the Everyone group.
WN16-SO-000320 V2R7 Services using Local System that use Negotiate when reverting to NTLM authentication must use the computer identity instead of authenticating anonymously.
WN16-SO-000330 V2R7 NTLM must be prevented from falling back to a Null session.
WN16-SO-000340 V2R7 PKU2U authentication using online identities must be prevented.
WN16-SO-000380 V2R7 The LAN Manager authentication level must be set to send NTLMv2 response only and to refuse LM and NTLM.
WN16-SO-000390 V2R7 Windows Server 2016 must be configured to at least negotiate signing for LDAP client signing.
WN16-SO-000400 V2R7 Session security for NTLM SSP-based clients must be configured to require NTLMv2 session security and 128-bit encryption.
WN16-SO-000410 V2R7 Session security for NTLM SSP-based servers must be configured to require NTLMv2 session security and 128-bit encryption.
WN16-SO-000450 V2R7 The default permissions of global system objects must be strengthened.
WN16-UC-000030 V2R7 Zone information must be preserved when saving attachments.
WN22-00-000010 V1R4 Windows Server 2022 users with Administrative privileges must have separate accounts for administrative duties and normal operational tasks.
WN22-00-000030 V1R4 Windows Server 2022 administrative accounts must not be used with applications that access the internet, such as web browsers, or with potential internet sources, such as email.
WN22-00-000040 V1R4 Windows Server 2022 members of the Backup Operators group must have separate accounts for backup duties and normal operational tasks.
WN22-00-000060 V1R4 Windows Server 2022 manually managed application account passwords must be changed at least annually or when a system administrator with knowledge of the password leaves the organization.
WN22-00-000090 V1R4 Windows Server 2022 domain-joined systems must have a Trusted Platform Module (TPM) enabled and ready for use.
WN22-00-000100 V1R4 Windows Server 2022 must be maintained at a supported servicing level.
WN22-00-000110 V1R4 Windows Server 2022 must use an antivirus program.
WN22-00-000120 V1R4 Windows Server 2022 must have a host-based intrusion detection or prevention system.
WN22-00-000240 V1R4 Windows Server 2022 must have software certificate installation files removed.
WN22-00-000280 V1R4 Windows Server 2022 must have a host-based firewall installed and enabled.
WN22-00-000420 V1R4 Windows Server 2022 FTP servers must be configured to prevent anonymous logons.
WN22-00-000430 V1R4 Windows Server 2022 FTP servers must be configured to prevent access to the system drive.
WN22-00-000450 V1R4 Windows Server 2022 must have orphaned security identifiers (SIDs) removed from user rights.
WN22-00-000460 V1R4 Windows Server 2022 systems must have Unified Extensible Firmware Interface (UEFI) firmware and be configured to run in UEFI mode, not Legacy BIOS.
WN22-00-000470 V1R4 Windows Server 2022 must have Secure Boot enabled.
WN22-CC-000030 V1R4 Windows Server 2022 Internet Protocol version 6 (IPv6) source routing must be configured to the highest protection level to prevent IP source routing.
WN22-CC-000040 V1R4 Windows Server 2022 source routing must be configured to the highest protection level to prevent Internet Protocol (IP) source routing.
WN22-CC-000050 V1R4 Windows Server 2022 must be configured to prevent Internet Control Message Protocol (ICMP) redirects from overriding Open Shortest Path First (OSPF)-generated routes.
WN22-CC-000070 V1R4 Windows Server 2022 insecure logons to an SMB server must be disabled.
WN22-CC-000080 V1R4 Windows Server 2022 hardened Universal Naming Convention (UNC) paths must be defined to require mutual authentication and integrity for at least the \\*\SYSVOL and \\*\NETLOGON shares.
WN22-CC-000100 V1R4 Windows Server 2022 must be configured to enable Remote host allows delegation of nonexportable credentials.
WN22-CC-000110 V1R4 Windows Server 2022 virtualization-based security must be enabled with the platform security level configured to Secure Boot or Secure Boot with DMA Protection.
WN22-CC-000130 V1R4 Windows Server 2022 Early Launch Antimalware, Boot-Start Driver Initialization Policy must prevent boot drivers identified as bad.
WN22-CC-000140 V1R4 Windows Server 2022 group policy objects must be reprocessed even if they have not changed.
WN22-CC-000180 V1R4 Windows Server 2022 users must be prompted to authenticate when the system wakes from sleep (on battery).
WN22-CC-000190 V1R4 Windows Server 2022 users must be prompted to authenticate when the system wakes from sleep (plugged in).
WN22-CC-000250 V1R4 Windows Server 2022 Diagnostic Data must be configured to send "required diagnostic data" or "optional diagnostic data".
WN22-CC-000260 V1R4 Windows Server 2022 Windows Update must not obtain updates from other PCs on the internet.
WN22-CC-000320 V1R4 Windows Server 2022 Turning off File Explorer heap termination on corruption must be disabled.
WN22-CC-000330 V1R4 Windows Server 2022 File Explorer shell protocol must run in protected mode.
WN22-CC-000390 V1R4 Windows Server 2022 must prevent attachments from being downloaded from RSS feeds.
WN22-CC-000440 V1R4 Windows Server 2022 users must be notified if a web-based program attempts to install software.
WN22-DC-000150 V1R4 Windows Server 2022 directory data (outside the root DSE) of a nonpublic directory must be configured to prevent anonymous access.
WN22-DC-000330 V1R4 Windows Server 2022 domain controllers must be configured to allow reset of machine account passwords.
WN22-DC-000430 V1R4 The password for the krbtgt account on a domain must be reset at least every 180 days.
WN22-MS-000050 V1R4 Windows Server 2022 must limit the caching of logon credentials to four or less on domain-joined member servers.
WN22-MS-000140 V1R4 Windows Server 2022 must be running Credential Guard on domain-joined member servers.
WN22-SO-000020 V1R4 Windows Server 2022 must prevent local accounts with blank passwords from being used from the network.
WN22-SO-000030 V1R4 Windows Server 2022 built-in administrator account must be renamed.
WN22-SO-000040 V1R4 Windows Server 2022 built-in guest account must be renamed.
WN22-SO-000100 V1R4 Windows Server 2022 maximum age for machine account passwords must be configured to 30 days or less.
WN22-SO-000150 V1R4 Windows Server 2022 Smart Card removal option must be configured to Force Logoff or Lock Workstation.
WN22-SO-000210 V1R4 Windows Server 2022 must not allow anonymous SID/Name translation.
WN22-SO-000220 V1R4 Windows Server 2022 must not allow anonymous enumeration of Security Account Manager (SAM) accounts.
WN22-SO-000240 V1R4 Windows Server 2022 must be configured to prevent anonymous users from having the same permissions as the Everyone group.
WN22-SO-000260 V1R4 Windows Server 2022 services using Local System that use Negotiate when reverting to NTLM authentication must use the computer identity instead of authenticating anonymously.
WN22-SO-000270 V1R4 Windows Server 2022 must prevent NTLM from falling back to a Null session.
WN22-SO-000280 V1R4 Windows Server 2022 must prevent PKU2U authentication using online identities.
WN22-SO-000310 V1R4 Windows Server 2022 LAN Manager authentication level must be configured to send NTLMv2 response only and to refuse LM and NTLM.
WN22-SO-000320 V1R4 Windows Server 2022 must be configured to at least negotiate signing for LDAP client signing.
WN22-SO-000330 V1R4 Windows Server 2022 session security for NTLM SSP-based clients must be configured to require NTLMv2 session security and 128-bit encryption.
WN22-SO-000340 V1R4 Windows Server 2022 session security for NTLM SSP-based servers must be configured to require NTLMv2 session security and 128-bit encryption.
WN22-SO-000370 V1R4 Windows Server 2022 default permissions of global system objects must be strengthened.
WN22-UC-000010 V1R4 Windows Server 2022 must preserve zone information when saving attachments.
RHEL-07-010290 V3R6 The Red Hat Enterprise Linux operating system must not allow accounts configured with blank or null passwords.
RHEL-07-020230 V3R6 The Red Hat Enterprise Linux operating system must be configured so that the x86 Ctrl-Alt-Delete key sequence is disabled on the command line.
RHEL-07-020231 V3R6 The Red Hat Enterprise Linux operating system must be configured so that the x86 Ctrl-Alt-Delete key sequence is disabled in the Graphical User Interface.
RHEL-07-020250 V3R6 The Red Hat Enterprise Linux operating system must be a vendor supported release.
RHEL-07-020260 V3R6 The Red Hat Enterprise Linux operating system security patches and updates must be installed and up to date.
RHEL-07-020270 V3R6 The Red Hat Enterprise Linux operating system must not have unnecessary accounts.
RHEL-07-020310 V3R6 The Red Hat Enterprise Linux operating system must be configured so that the root account must be the only account having unrestricted access to the system.
RHEL-07-020320 V3R6 The Red Hat Enterprise Linux operating system must be configured so that all files and directories have a valid owner.
RHEL-07-020330 V3R6 The Red Hat Enterprise Linux operating system must be configured so that all files and directories have a valid group owner.
RHEL-07-020610 V3R6 The Red Hat Enterprise Linux operating system must be configured so that all local interactive user accounts, upon creation, are assigned a home directory.
RHEL-07-020620 V3R6 The Red Hat Enterprise Linux operating system must be configured so that all local interactive users have a home directory assigned and defined in the /etc/passwd file.
RHEL-07-020630 V3R6 The Red Hat Enterprise Linux operating system must be configured so that all local interactive user home directories have mode 0750 or less permissive.
RHEL-07-020640 V3R6 The Red Hat Enterprise Linux operating system must be configured so that all local interactive user home directories are owned by their respective users.
RHEL-07-020650 V3R6 The Red Hat Enterprise Linux operating system must be configured so that all local interactive user home directories are group-owned by the home directory owners primary group.
RHEL-07-020660 V3R6 The Red Hat Enterprise Linux operating system must be configured so that all files and directories contained in local interactive user home directories have a valid owner.
RHEL-07-020670 V3R6 The Red Hat Enterprise Linux operating system must be configured so that all files and directories contained in local interactive user home directories are group-owned by a group of which the home directory owner is a member.
RHEL-07-020680 V3R6 The Red Hat Enterprise Linux operating system must be configured so that all files and directories contained in local interactive user home directories have a mode of 0750 or less permissive.
RHEL-07-020690 V3R6 The Red Hat Enterprise Linux operating system must be configured so that all local initialization files for interactive users are owned by the home directory user or root.
RHEL-07-020700 V3R6 The Red Hat Enterprise Linux operating system must be configured so that all local initialization files for local interactive users are be group-owned by the users primary group or root.
RHEL-07-020710 V3R6 The Red Hat Enterprise Linux operating system must be configured so that all local initialization files have mode 0740 or less permissive.
RHEL-07-020720 V3R6 The Red Hat Enterprise Linux operating system must be configured so that all local interactive user initialization files executable search paths contain only paths that resolve to the users home directory.
RHEL-07-020730 V3R6 The Red Hat Enterprise Linux operating system must be configured so that local initialization files do not execute world-writable programs.
RHEL-07-020900 V3R6 The Red Hat Enterprise Linux operating system must be configured so that all system device files are correctly labeled to prevent unauthorized modification.
RHEL-07-021000 V3R6 The Red Hat Enterprise Linux operating system must be configured so that file systems containing user home directories are mounted to prevent files with the setuid and setgid bit set from being executed.
RHEL-07-021010 V3R6 The Red Hat Enterprise Linux operating system must prevent files with the setuid and setgid bit set from being executed on file systems that are used with removable media.
RHEL-07-021020 V3R6 The Red Hat Enterprise Linux operating system must prevent files with the setuid and setgid bit set from being executed on file systems that are being imported via Network File System (NFS).
RHEL-07-021021 V3R6 The Red Hat Enterprise Linux operating system must prevent binary files from being executed on file systems that are being imported via Network File System (NFS).
RHEL-07-021030 V3R6 The Red Hat Enterprise Linux operating system must be configured so that all world-writable directories are group-owned by root, sys, bin, or an application group.
RHEL-07-021040 V3R6 The Red Hat Enterprise Linux operating system must set the umask value to 077 for all local interactive user accounts.
RHEL-07-021100 V3R6 The Red Hat Enterprise Linux operating system must have cron logging implemented.
RHEL-07-021110 V3R6 The Red Hat Enterprise Linux operating system must be configured so that the cron.allow file, if it exists, is owned by root.
RHEL-07-021120 V3R6 The Red Hat Enterprise Linux operating system must be configured so that the cron.allow file, if it exists, is group-owned by root.
RHEL-07-021300 V3R6 The Red Hat Enterprise Linux operating system must disable Kernel core dumps unless needed.
RHEL-07-021310 V3R6 The Red Hat Enterprise Linux operating system must be configured so that a separate file system is used for user home directories (such as /home or an equivalent).
RHEL-07-021320 V3R6 The Red Hat Enterprise Linux operating system must use a separate file system for /var.
RHEL-07-021330 V3R6 The Red Hat Enterprise Linux operating system must use a separate file system for the system audit data path.
RHEL-07-021340 V3R6 The Red Hat Enterprise Linux operating system must use a separate file system for /tmp (or equivalent).
RHEL-07-021600 V3R6 The Red Hat Enterprise Linux operating system must be configured so that the file integrity tool is configured to verify Access Control Lists (ACLs).
RHEL-07-021610 V3R6 The Red Hat Enterprise Linux operating system must be configured so that the file integrity tool is configured to verify extended attributes.
RHEL-07-021620 V3R6 The Red Hat Enterprise Linux operating system must use a file integrity tool that is configured to use FIPS 140-2 approved cryptographic hashes for validating file contents and directories.
RHEL-07-031000 V3R6 The Red Hat Enterprise Linux operating system must send rsyslog output to a log aggregation server.
RHEL-07-031010 V3R6 The Red Hat Enterprise Linux operating system must be configured so that the rsyslog daemon does not accept log messages from other servers unless the server is being used for log aggregation.
RHEL-07-040201 V3R6 The Red Hat Enterprise Linux operating system must implement virtual address space randomization.
RHEL-07-040330 V3R6 The Red Hat Enterprise Linux operating system must be configured so that the SSH daemon does not allow authentication using RSA rhosts authentication.
RHEL-07-040350 V3R6 The Red Hat Enterprise Linux operating system must be configured so that the SSH daemon does not allow authentication using rhosts authentication.
RHEL-07-040360 V3R6 The Red Hat Enterprise Linux operating system must display the date and time of the last successful account logon upon an SSH logon.
RHEL-07-040370 V3R6 The Red Hat Enterprise Linux operating system must not permit direct logons to the root account using remote access via SSH.
RHEL-07-040380 V3R6 The Red Hat Enterprise Linux operating system must be configured so that the SSH daemon does not allow authentication using known hosts authentication.
RHEL-07-040410 V3R6 The Red Hat Enterprise Linux operating system must be configured so that the SSH public host key files have mode 0644 or less permissive.
RHEL-07-040420 V3R6 The Red Hat Enterprise Linux operating system must be configured so that the SSH private host key files have mode 0600 or less permissive.
RHEL-07-040450 V3R6 The Red Hat Enterprise Linux operating system must be configured so that the SSH daemon performs strict mode checking of home directory configuration files.
RHEL-07-040460 V3R6 The Red Hat Enterprise Linux operating system must be configured so that the SSH daemon uses privilege separation.
RHEL-07-040470 V3R6 The Red Hat Enterprise Linux operating system must be configured so that the SSH daemon does not allow compression or only allows compression after successful authentication.
RHEL-07-040520 V3R6 The Red Hat Enterprise Linux operating system must enable an application firewall, if available.
RHEL-07-040530 V3R6 The Red Hat Enterprise Linux operating system must display the date and time of the last successful account logon upon logon.
RHEL-07-040540 V3R6 The Red Hat Enterprise Linux operating system must not contain .shosts files.
RHEL-07-040550 V3R6 The Red Hat Enterprise Linux operating system must not contain shosts.equiv files.
RHEL-07-040600 V3R6 For Red Hat Enterprise Linux operating systems using DNS resolution, at least two name servers must be configured.
RHEL-07-040610 V3R6 The Red Hat Enterprise Linux operating system must not forward Internet Protocol version 4 (IPv4) source-routed packets.
RHEL-07-040611 V3R6 The Red Hat Enterprise Linux operating system must use a reverse-path filter for IPv4 network traffic when possible on all interfaces.
RHEL-07-040612 V3R6 The Red Hat Enterprise Linux operating system must use a reverse-path filter for IPv4 network traffic when possible by default.
RHEL-07-040620 V3R6 The Red Hat Enterprise Linux operating system must not forward Internet Protocol version 4 (IPv4) source-routed packets by default.
RHEL-07-040630 V3R6 The Red Hat Enterprise Linux operating system must not respond to Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) echoes sent to a broadcast address.
RHEL-07-040640 V3R6 The Red Hat Enterprise Linux operating system must prevent Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirect messages from being accepted.
RHEL-07-040641 V3R6 The Red Hat Enterprise Linux operating system must ignore Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirect messages.
RHEL-07-040650 V3R6 The Red Hat Enterprise Linux operating system must not allow interfaces to perform Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirects by default.
RHEL-07-040660 V3R6 The Red Hat Enterprise Linux operating system must not send Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirects.
RHEL-07-040670 V3R6 Network interfaces configured on the Red Hat Enterprise Linux operating system must not be in promiscuous mode.
RHEL-07-040680 V3R6 The Red Hat Enterprise Linux operating system must be configured to prevent unrestricted mail relaying.
RHEL-07-040690 V3R6 The Red Hat Enterprise Linux operating system must not have a File Transfer Protocol (FTP) server package installed unless needed.
RHEL-07-040700 V3R6 The Red Hat Enterprise Linux operating system must not have the Trivial File Transfer Protocol (TFTP) server package installed if not required for operational support.
RHEL-07-040710 V3R6 The Red Hat Enterprise Linux operating system must be configured so that remote X connections are disabled except to fulfill documented and validated mission requirements.
RHEL-07-040720 V3R6 The Red Hat Enterprise Linux operating system must be configured so that if the Trivial File Transfer Protocol (TFTP) server is required, the TFTP daemon is configured to operate in secure mode.
RHEL-07-040730 V3R6 The Red Hat Enterprise Linux operating system must not have a graphical display manager installed unless approved.
RHEL-07-040740 V3R6 The Red Hat Enterprise Linux operating system must not be performing packet forwarding unless the system is a router.
RHEL-07-040750 V3R6 The Red Hat Enterprise Linux operating system must be configured so that the Network File System (NFS) is configured to use RPCSEC_GSS.
RHEL-07-040800 V3R6 SNMP community strings on the Red Hat Enterprise Linux operating system must be changed from the default.
RHEL-07-040810 V3R6 The Red Hat Enterprise Linux operating system access control program must be configured to grant or deny system access to specific hosts and services.
RHEL-07-040820 V3R6 The Red Hat Enterprise Linux operating system must not have unauthorized IP tunnels configured.
RHEL-07-040830 V3R6 The Red Hat Enterprise Linux operating system must not forward IPv6 source-routed packets.
RHEL-07-010020 V3R6 The Red Hat Enterprise Linux operating system must be configured so that the cryptographic hash of system files and commands matches vendor values.
RHEL-07-020019 V3R6 The Red Hat Enterprise Linux operating system must implement the Endpoint Security for Linux Threat Prevention tool.
RHEL-07-032000 V3R6 The Red Hat Enterprise Linux operating system must use a virus scan program.
RHEL-07-021031 V3R6 The Red Hat Enterprise Linux operating system must be configured so that all world-writable directories are owned by root, sys, bin, or an application user.
RHEL-07-040711 V3R6 The Red Hat Enterprise Linux operating system SSH daemon must prevent remote hosts from connecting to the proxy display.
RHEL-07-010341 V3R6 The Red Hat Enterprise Linux operating system must restrict privilege elevation to authorized personnel.
RHEL-07-010342 V3R6 The Red Hat Enterprise Linux operating system must use the invoking user's password for privilege escalation when using "sudo".
RHEL-07-010291 V3R6 The Red Hat Enterprise Linux operating system must not have accounts configured with blank or null passwords.
RHEL-07-010339 V3R6 The Red Hat Enterprise Linux operating system must specify the default "include" directory for the /etc/sudoers file.
RHEL-09-211010 V1R3 RHEL 9 must be a vendor-supported release.
RHEL-09-211015 V1R3 RHEL 9 vendor packaged system security patches and updates must be installed and up to date.
RHEL-09-211030 V1R3 The graphical display manager must not be the default target on RHEL 9 unless approved.
RHEL-09-211035 V1R3 RHEL 9 must enable the hardware random number generator entropy gatherer service.
RHEL-09-212015 V1R3 RHEL 9 must disable the ability of systemd to spawn an interactive boot process.
RHEL-09-212025 V1R3 RHEL 9 /boot/grub2/grub.cfg file must be group-owned by root.
RHEL-09-212030 V1R3 RHEL 9 /boot/grub2/grub.cfg file must be owned by root.
RHEL-09-212035 V1R3 RHEL 9 must disable virtual system calls.
RHEL-09-212040 V1R3 RHEL 9 must clear the page allocator to prevent use-after-free attacks.
RHEL-09-213020 V1R3 RHEL 9 must prevent the loading of a new kernel for later execution.
RHEL-09-213040 V1R3 RHEL 9 must disable the kernel.core_pattern.
RHEL-09-213085 V1R3 RHEL 9 must disable core dump backtraces.
RHEL-09-213090 V1R3 RHEL 9 must disable storing core dumps.
RHEL-09-213095 V1R3 RHEL 9 must disable core dumps for all users.
RHEL-09-213100 V1R3 RHEL 9 must disable acquiring, saving, and processing core dumps.
RHEL-09-213105 V1R3 RHEL 9 must disable the use of user namespaces.
RHEL-09-213115 V1R3 The kdump service on RHEL 9 must be disabled.
RHEL-09-214030 V1R3 RHEL 9 must be configured so that the cryptographic hashes of system files match vendor values.
RHEL-09-215020 V1R3 RHEL 9 must not have the sendmail package installed.
RHEL-09-215060 V1R3 RHEL 9 must not have a Trivial File Transfer Protocol (TFTP) server package installed.
RHEL-09-215065 V1R3 RHEL 9 must not have the quagga package installed.
RHEL-09-215070 V1R3 A graphical display manager must not be installed on RHEL 9 unless approved.
RHEL-09-215080 V1R3 RHEL 9 must have the gnutls-utils package installed.
RHEL-09-215085 V1R3 RHEL 9 must have the nss-tools package installed.
RHEL-09-215090 V1R3 RHEL 9 must have the rng-tools package installed.
RHEL-09-231010 V1R3 A separate RHEL 9 file system must be used for user home directories (such as /home or an equivalent).
RHEL-09-231015 V1R3 RHEL 9 must use a separate file system for /tmp.
RHEL-09-231020 V1R3 RHEL 9 must use a separate file system for /var.
RHEL-09-231025 V1R3 RHEL 9 must use a separate file system for /var/log.
RHEL-09-231035 V1R3 RHEL 9 must use a separate file system for /var/tmp.
RHEL-09-231055 V1R3 RHEL 9 must prevent code from being executed on file systems that contain user home directories.
RHEL-09-231060 V1R3 RHEL 9 must be configured so that the Network File System (NFS) is configured to use RPCSEC_GSS.
RHEL-09-231065 V1R3 RHEL 9 must prevent special devices on file systems that are imported via Network File System (NFS).
RHEL-09-231070 V1R3 RHEL 9 must prevent code from being executed on file systems that are imported via Network File System (NFS).
RHEL-09-231075 V1R3 RHEL 9 must prevent files with the setuid and setgid bit set from being executed on file systems that are imported via Network File System (NFS).
RHEL-09-231080 V1R3 RHEL 9 must prevent code from being executed on file systems that are used with removable media.
RHEL-09-231085 V1R3 RHEL 9 must prevent special devices on file systems that are used with removable media.
RHEL-09-231090 V1R3 RHEL 9 must prevent files with the setuid and setgid bit set from being executed on file systems that are used with removable media.
RHEL-09-231200 V1R3 RHEL 9 must prevent special devices on non-root local partitions.
RHEL-09-232040 V1R3 RHEL 9 cron configuration directories must have a mode of 0700 or less permissive.
RHEL-09-232045 V1R3 All RHEL 9 local initialization files must have mode 0740 or less permissive.
RHEL-09-232050 V1R3 All RHEL 9 local interactive user home directories must have mode 0750 or less permissive.
RHEL-09-232055 V1R3 RHEL 9 /etc/group file must have mode 0644 or less permissive to prevent unauthorized access.
RHEL-09-232060 V1R3 RHEL 9 /etc/group- file must have mode 0644 or less permissive to prevent unauthorized access.
RHEL-09-232065 V1R3 RHEL 9 /etc/gshadow file must have mode 0000 or less permissive to prevent unauthorized access.
RHEL-09-232070 V1R3 RHEL 9 /etc/gshadow- file must have mode 0000 or less permissive to prevent unauthorized access.
RHEL-09-232075 V1R3 RHEL 9 /etc/passwd file must have mode 0644 or less permissive to prevent unauthorized access.
RHEL-09-232080 V1R3 RHEL 9 /etc/passwd- file must have mode 0644 or less permissive to prevent unauthorized access.
RHEL-09-232085 V1R3 RHEL 9 /etc/shadow- file must have mode 0000 or less permissive to prevent unauthorized access.
RHEL-09-232090 V1R3 RHEL 9 /etc/group file must be owned by root.
RHEL-09-232095 V1R3 RHEL 9 /etc/group file must be group-owned by root.
RHEL-09-232100 V1R3 RHEL 9 /etc/group- file must be owned by root.
RHEL-09-232105 V1R3 RHEL 9 /etc/group- file must be group-owned by root.
RHEL-09-232110 V1R3 RHEL 9 /etc/gshadow file must be owned by root.
RHEL-09-232115 V1R3 RHEL 9 /etc/gshadow file must be group-owned by root.
RHEL-09-232120 V1R3 RHEL 9 /etc/gshadow- file must be owned by root.
RHEL-09-232125 V1R3 RHEL 9 /etc/gshadow- file must be group-owned by root.
RHEL-09-232130 V1R3 RHEL 9 /etc/passwd file must be owned by root.
RHEL-09-232135 V1R3 RHEL 9 /etc/passwd file must be group-owned by root.
RHEL-09-232140 V1R3 RHEL 9 /etc/passwd- file must be owned by root.
RHEL-09-232145 V1R3 RHEL 9 /etc/passwd- file must be group-owned by root.
RHEL-09-232150 V1R3 RHEL 9 /etc/shadow file must be owned by root.
RHEL-09-232155 V1R3 RHEL 9 /etc/shadow file must be group-owned by root.
RHEL-09-232160 V1R3 RHEL 9 /etc/shadow- file must be owned by root.
RHEL-09-232165 V1R3 RHEL 9 /etc/shadow- file must be group-owned by root.
RHEL-09-232230 V1R3 RHEL 9 cron configuration files directory must be owned by root.
RHEL-09-232235 V1R3 RHEL 9 cron configuration files directory must be group-owned by root.
RHEL-09-232240 V1R3 All RHEL 9 world-writable directories must be owned by root, sys, bin, or an application user.
RHEL-09-232250 V1R3 All RHEL 9 local files and directories must have a valid group owner.
RHEL-09-232255 V1R3 All RHEL 9 local files and directories must have a valid owner.
RHEL-09-232260 V1R3 RHEL 9 must be configured so that all system device files are correctly labeled to prevent unauthorized modification.
RHEL-09-232265 V1R3 RHEL 9 /etc/crontab file must have mode 0600.
RHEL-09-232270 V1R3 RHEL 9 /etc/shadow file must have mode 0000 to prevent unauthorized access.
RHEL-09-251020 V1R3 A RHEL 9 firewall must employ a deny-all, allow-by-exception policy for allowing connections to other systems.
RHEL-09-251040 V1R3 RHEL 9 network interfaces must not be in promiscuous mode.
RHEL-09-251045 V1R3 RHEL 9 must enable hardening for the Berkeley Packet Filter just-in-time compiler.
RHEL-09-252035 V1R3 RHEL 9 systems using Domain Name Servers (DNS) resolution must have at least two name servers configured.
RHEL-09-252040 V1R3 RHEL 9 must configure a DNS processing mode set be Network Manager.
RHEL-09-252045 V1R3 RHEL 9 must not have unauthorized IP tunnels configured.
RHEL-09-252050 V1R3 RHEL 9 must be configured to prevent unrestricted mail relaying.
RHEL-09-252055 V1R3 If the Trivial File Transfer Protocol (TFTP) server is required, RHEL 9 TFTP daemon must be configured to operate in secure mode.
RHEL-09-252065 V1R3 RHEL 9 libreswan package must be installed.
RHEL-09-252070 V1R3 There must be no shosts.equiv files on RHEL 9.
RHEL-09-252075 V1R3 There must be no .shosts files on RHEL 9.
RHEL-09-253010 V1R3 RHEL 9 must be configured to use TCP syncookies.
RHEL-09-253015 V1R3 RHEL 9 must ignore Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirect messages.
RHEL-09-253020 V1R3 RHEL 9 must not forward Internet Protocol version 4 (IPv4) source-routed packets.
RHEL-09-253025 V1R3 RHEL 9 must log IPv4 packets with impossible addresses.
RHEL-09-253030 V1R3 RHEL 9 must log IPv4 packets with impossible addresses by default.
RHEL-09-253035 V1R3 RHEL 9 must use reverse path filtering on all IPv4 interfaces.
RHEL-09-253040 V1R3 RHEL 9 must prevent IPv4 Internet Control Message Protocol (ICMP) redirect messages from being accepted.
RHEL-09-253045 V1R3 RHEL 9 must not forward IPv4 source-routed packets by default.
RHEL-09-253050 V1R3 RHEL 9 must use a reverse-path filter for IPv4 network traffic when possible by default.
RHEL-09-253055 V1R3 RHEL 9 must not respond to Internet Control Message Protocol (ICMP) echoes sent to a broadcast address.
RHEL-09-253060 V1R3 RHEL 9 must limit the number of bogus Internet Control Message Protocol (ICMP) response errors logs.
RHEL-09-253065 V1R3 RHEL 9 must not send Internet Control Message Protocol (ICMP) redirects.
RHEL-09-253070 V1R3 RHEL 9 must not allow interfaces to perform Internet Control Message Protocol (ICMP) redirects by default.
RHEL-09-253075 V1R3 RHEL 9 must not enable IPv4 packet forwarding unless the system is a router.
RHEL-09-254010 V1R3 RHEL 9 must not accept router advertisements on all IPv6 interfaces.
RHEL-09-254015 V1R3 RHEL 9 must ignore IPv6 Internet Control Message Protocol (ICMP) redirect messages.
RHEL-09-254020 V1R3 RHEL 9 must not forward IPv6 source-routed packets.
RHEL-09-254025 V1R3 RHEL 9 must not enable IPv6 packet forwarding unless the system is a router.
RHEL-09-254030 V1R3 RHEL 9 must not accept router advertisements on all IPv6 interfaces by default.
RHEL-09-254035 V1R3 RHEL 9 must prevent IPv6 Internet Control Message Protocol (ICMP) redirect messages from being accepted.
RHEL-09-254040 V1R3 RHEL 9 must not forward IPv6 source-routed packets by default.
RHEL-09-255020 V1R3 RHEL 9 must have the openssh-clients package installed.
RHEL-09-255105 V1R3 RHEL 9 SSH server configuration file must be group-owned by root.
RHEL-09-255110 V1R3 RHEL 9 SSH server configuration file must be owned by root.
RHEL-09-255115 V1R3 RHEL 9 SSH server configuration file must have mode 0600 or less permissive.
RHEL-09-255120 V1R3 RHEL 9 SSH private host key files must have mode 0640 or less permissive.
RHEL-09-255125 V1R3 RHEL 9 SSH public host key files must have mode 0644 or less permissive.
RHEL-09-255130 V1R3 RHEL 9 SSH daemon must not allow compression or must only allow compression after successful authentication.
RHEL-09-255145 V1R3 RHEL 9 SSH daemon must not allow rhosts authentication.
RHEL-09-255150 V1R3 RHEL 9 SSH daemon must not allow known hosts authentication.
RHEL-09-255155 V1R3 RHEL 9 SSH daemon must disable remote X connections for interactive users.
RHEL-09-255160 V1R3 RHEL 9 SSH daemon must perform strict mode checking of home directory configuration files.
RHEL-09-255165 V1R3 RHEL 9 SSH daemon must display the date and time of the last successful account logon upon an SSH logon.
RHEL-09-255170 V1R3 RHEL 9 SSH daemon must be configured to use privilege separation.
RHEL-09-255175 V1R3 RHEL 9 SSH daemon must prevent remote hosts from connecting to the proxy display.
RHEL-09-271090 V1R3 RHEL 9 effective dconf policy must match the policy keyfiles.
RHEL-09-271095 V1R3 RHEL 9 must disable the ability of a user to restart the system from the login screen.
RHEL-09-271100 V1R3 RHEL 9 must prevent a user from overriding the disable-restart-buttons setting for the graphical user interface.
RHEL-09-271105 V1R3 RHEL 9 must disable the ability of a user to accidentally press Ctrl-Alt-Del and cause a system to shut down or reboot.
RHEL-09-271110 V1R3 RHEL 9 must prevent a user from overriding the Ctrl-Alt-Del sequence settings for the graphical user interface.
RHEL-09-271115 V1R3 RHEL 9 must disable the user list at logon for graphical user interfaces.
RHEL-09-411020 V1R3 All RHEL 9 local interactive user accounts must be assigned a home directory upon creation.
RHEL-09-411025 V1R3 RHEL 9 must set the umask value to 077 for all local interactive user accounts.
RHEL-09-411035 V1R3 RHEL 9 system accounts must not have an interactive login shell.
RHEL-09-411055 V1R3 Executable search paths within the initialization files of all local interactive RHEL 9 users must only contain paths that resolve to the system default or the users home directory.
RHEL-09-411060 V1R3 All RHEL 9 local interactive users must have a home directory assigned in the /etc/passwd file.
RHEL-09-411065 V1R3 All RHEL 9 local interactive user home directories defined in the /etc/passwd file must exist.
RHEL-09-411070 V1R3 All RHEL 9 local interactive user home directories must be group-owned by the home directory owner's primary group.
RHEL-09-411095 V1R3 RHEL 9 must not have unauthorized accounts.
RHEL-09-411100 V1R3 The root account must be the only account having unrestricted access to RHEL 9 system.
RHEL-09-411115 V1R3 Local RHEL 9 initialization files must not execute world-writable programs.
RHEL-09-412075 V1R3 RHEL 9 must display the date and time of the last successful account logon upon logon.
RHEL-09-431025 V1R3 RHEL 9 must have policycoreutils package installed.
RHEL-09-431030 V1R3 RHEL 9 policycoreutils-python-utils package must be installed.
RHEL-09-432020 V1R3 RHEL 9 must use the invoking user's password for privilege escalation when using "sudo".
RHEL-09-432030 V1R3 RHEL 9 must restrict privilege elevation to authorized personnel.
RHEL-09-611025 V1R3 RHEL 9 must not allow blank or null passwords.
RHEL-09-611045 V1R3 RHEL 9 must ensure the password complexity module is enabled in the system-auth file.
RHEL-09-611155 V1R3 RHEL 9 must not have accounts configured with blank or null passwords.
RHEL-09-651020 V1R3 RHEL 9 must use a file integrity tool that is configured to use FIPS 140-3-approved cryptographic hashes for validating file contents and directories.
RHEL-09-651030 V1R3 RHEL 9 must be configured so that the file integrity tool verifies Access Control Lists (ACLs).
RHEL-09-651035 V1R3 RHEL 9 must be configured so that the file integrity tool verifies extended attributes.
RHEL-09-652015 V1R3 RHEL 9 must have the packages required for encrypting offloaded audit logs installed.
RHEL-09-652020 V1R3 The rsyslog service on RHEL 9 must be active.
RHEL-09-652025 V1R3 RHEL 9 must be configured so that the rsyslog daemon does not accept log messages from other servers unless the server is being used for log aggregation.
RHEL-09-652060 V1R3 RHEL 9 must use cron logging.
RHEL-09-653105 V1R3 RHEL 9 must write audit records to disk.
OL08-00-010000 V1R3 OL 8 must be a vendor-supported release.
OL08-00-010010 V1R3 OL 8 vendor-packaged system security patches and updates must be installed and up to date.
OL08-00-010382 V1R3 OL 8 must restrict privilege elevation to authorized personnel.
OL08-00-010383 V1R3 OL 8 must use the invoking user's password for privilege escalation when using "sudo".
OL08-00-010424 V1R3 OL 8 must not let Meltdown and Spectre exploit critical vulnerabilities in modern processors.
OL08-00-010460 V1R3 There must be no "shosts.equiv" files on the OL 8 operating system.
OL08-00-010470 V1R3 There must be no ".shosts" files on the OL 8 operating system.
OL08-00-010471 V1R3 OL 8 must enable the hardware random number generator entropy gatherer service.
OL08-00-010472 V1R3 OL 8 must have the packages required to use the hardware random number generator entropy gatherer service.
OL08-00-010480 V1R3 The OL 8 SSH public host key files must have mode "0644" or less permissive.
OL08-00-010490 V1R3 The OL 8 SSH private host key files must have mode "0600" or less permissive.
OL08-00-010500 V1R3 The OL 8 SSH daemon must perform strict mode checking of home directory configuration files.
OL08-00-010510 V1R3 The OL 8 SSH daemon must not allow compression or must only allow compression after successful authentication.
OL08-00-010520 V1R3 The OL 8 SSH daemon must not allow authentication using known host's authentication.
OL08-00-010521 V1R3 The OL 8 SSH daemon must not allow Kerberos authentication, except to fulfill documented and validated mission requirements.
OL08-00-010522 V1R3 The OL 8 SSH daemon must not allow GSSAPI authentication, except to fulfill documented and validated mission requirements.
OL08-00-010540 V1R3 OL 8 must use a separate file system for "/var".
OL08-00-010541 V1R3 OL 8 must use a separate file system for "/var/log".
OL08-00-010542 V1R3 OL 8 must use a separate file system for the system audit data path.
OL08-00-010543 V1R3 OL 8 must use a separate file system for "/tmp".
OL08-00-010544 V1R3 OL 8 must use a separate file system for /var/tmp.
OL08-00-010561 V1R3 OL 8 must have the rsyslog service enabled and active.
OL08-00-010570 V1R3 OL 8 must prevent files with the setuid and setgid bit set from being executed on file systems that contain user home directories.
OL08-00-010571 V1R3 OL 8 must prevent files with the setuid and setgid bit set from being executed on the /boot directory.
OL08-00-010572 V1R3 OL 8 must prevent files with the setuid and setgid bit set from being executed on the /boot/efi directory.
OL08-00-010580 V1R3 OL 8 must prevent special devices on non-root local partitions.
OL08-00-010590 V1R3 OL 8 file systems that contain user home directories must not execute binary files.
OL08-00-010600 V1R3 OL 8 file systems must not interpret character or block special devices from untrusted file systems.
OL08-00-010610 V1R3 OL 8 file systems must not execute binary files on removable media.
OL08-00-010620 V1R3 OL 8 must prevent files with the setuid and setgid bit set from being executed on file systems that are used with removable media.
OL08-00-010630 V1R3 OL 8 file systems must not execute binary files that are imported via Network File System (NFS).
OL08-00-010640 V1R3 OL 8 file systems must not interpret character or block special devices that are imported via NFS.
OL08-00-010650 V1R3 OL 8 must prevent files with the setuid and setgid bit set from being executed on file systems that are imported via Network File System (NFS).
OL08-00-010660 V1R3 Local OL 8 initialization files must not execute world-writable programs.
OL08-00-010671 V1R3 OL 8 must disable the "kernel.core_pattern".
OL08-00-010672 V1R3 OL 8 must disable acquiring, saving, and processing core dumps.
OL08-00-010673 V1R3 OL 8 must disable core dumps for all users.
OL08-00-010674 V1R3 OL 8 must disable storing core dumps.
OL08-00-010675 V1R3 OL 8 must disable core dump backtraces.
OL08-00-010680 V1R3 For OL 8 systems using Domain Name Servers (DNS) resolution, at least two name servers must be configured.
OL08-00-010690 V1R3 Executable search paths within the initialization files of all local interactive OL 8 users must only contain paths that resolve to the system default or the user's home directory.
OL08-00-010700 V1R3 All OL 8 world-writable directories must be owned by root, sys, bin, or an application user.
OL08-00-010710 V1R3 All OL 8 world-writable directories must be group-owned by root, sys, bin, or an application group.
OL08-00-010720 V1R3 All OL 8 local interactive users must have a home directory assigned in the "/etc/passwd" file.
OL08-00-010730 V1R3 All OL 8 local interactive user home directories must have mode "0750" or less permissive.
OL08-00-010731 V1R3 All OL 8 local interactive user home directory files must have mode "0750" or less permissive.
OL08-00-010740 V1R3 All OL 8 local interactive user home directories must be group-owned by the home directory owner's primary group.
OL08-00-010741 V1R3 OL 8 must be configured so that all files and directories contained in local interactive user home directories are group-owned by a group of which the home directory owner is a member.
OL08-00-010750 V1R3 All OL 8 local interactive user home directories defined in the "/etc/passwd" file must exist.
OL08-00-010760 V1R3 All OL 8 local interactive user accounts must be assigned a home directory upon creation.
OL08-00-010770 V1R3 All OL 8 local initialization files must have mode "0740" or less permissive.
OL08-00-010780 V1R3 All OL 8 files and directories must have a valid owner.
OL08-00-010790 V1R3 All OL 8 files and directories must have a valid group owner.
OL08-00-010800 V1R3 A separate OL 8 filesystem must be used for user home directories (such as "/home" or an equivalent).
OL08-00-020032 V1R3 OL 8 must disable the user list at logon for graphical user interfaces.
OL08-00-020320 V1R3 OL 8 must not have unnecessary accounts.
OL08-00-020330 V1R3 OL 8 must not allow accounts configured with blank or null passwords.
OL08-00-020331 V1R3 OL 8 must not allow blank or null passwords in the system-auth file.
OL08-00-020332 V1R3 OL 8 must not allow blank or null passwords in the password-auth file.
OL08-00-020340 V1R3 OL 8 must display the date and time of the last successful account logon upon logon.
OL08-00-020350 V1R3 OL 8 must display the date and time of the last successful account logon upon an SSH logon.
OL08-00-030010 V1R3 Cron logging must be implemented in OL 8.
OL08-00-030061 V1R3 The OL 8 audit system must audit local events.
OL08-00-030063 V1R3 OL 8 must resolve audit information before writing to disk.
OL08-00-030670 V1R3 OL 8 must have the packages required for offloading audit logs installed.
OL08-00-030680 V1R3 OL 8 must have the packages required for encrypting offloaded audit logs installed.
OL08-00-040021 V1R3 OL 8 must not have the asynchronous transfer mode (ATM) kernel module installed if not required for operational support.
OL08-00-040022 V1R3 OL 8 must not have the Controller Area Network (CAN) kernel module installed if not required for operational support.
OL08-00-040023 V1R3 OL 8 must not have the stream control transmission protocol (SCTP) kernel module installed if not required for operational support.
OL08-00-040170 V1R3 The x86 Ctrl-Alt-Delete key sequence must be disabled on OL 8.
OL08-00-040171 V1R3 The x86 Ctrl-Alt-Delete key sequence in OL 8 must be disabled if a graphical user interface is installed.
OL08-00-040172 V1R3 OL 8 must disable the systemd Ctrl-Alt-Delete burst key sequence.
OL08-00-040180 V1R3 OL 8 must disable the debug-shell systemd service.
OL08-00-040190 V1R3 The Trivial File Transfer Protocol (TFTP) server package must not be installed if not required for OL 8 operational support.
OL08-00-040200 V1R3 The root account must be the only account having unrestricted access to the OL 8 system.
OL08-00-040209 V1R3 OL 8 must prevent IPv4 Internet Control Message Protocol (ICMP) redirect messages from being accepted.
OL08-00-040210 V1R3 OL 8 must prevent IPv6 Internet Control Message Protocol (ICMP) redirect messages from being accepted.
OL08-00-040220 V1R3 OL 8 must not send Internet Control Message Protocol (ICMP) redirects.
OL08-00-040230 V1R3 OL 8 must not respond to Internet Control Message Protocol (ICMP) echoes sent to a broadcast address.
OL08-00-040239 V1R3 OL 8 must not forward IPv4 source-routed packets.
OL08-00-040240 V1R3 OL 8 must not forward IPv6 source-routed packets.
OL08-00-040249 V1R3 OL 8 must not forward IPv4 source-routed packets by default.
OL08-00-040250 V1R3 OL 8 must not forward IPv6 source-routed packets by default.
OL08-00-040260 V1R3 OL 8 must not enable IPv6 packet forwarding unless the system is a router.
OL08-00-040261 V1R3 OL 8 must not accept router advertisements on all IPv6 interfaces.
OL08-00-040262 V1R3 OL 8 must not accept router advertisements on all IPv6 interfaces by default.
OL08-00-040270 V1R3 OL 8 must not allow interfaces to perform Internet Control Message Protocol (ICMP) redirects by default.
OL08-00-040279 V1R3 OL 8 must ignore IPv4 Internet Control Message Protocol (ICMP) redirect messages.
OL08-00-040280 V1R3 OL 8 must ignore IPv6 Internet Control Message Protocol (ICMP) redirect messages.
OL08-00-040281 V1R3 OL 8 must disable access to the network "bpf" syscall from unprivileged processes.
OL08-00-040282 V1R3 OL 8 must restrict the use of "ptrace" to descendant processes.
OL08-00-040283 V1R3 OL 8 must restrict exposed kernel pointer addresses access.
OL08-00-040284 V1R3 OL 8 must disable the use of user namespaces.
OL08-00-040285 V1R3 OL 8 must use reverse path filtering on all IPv4 interfaces.
OL08-00-040286 V1R3 OL 8 must enable hardening for the Berkeley Packet Filter Just-in-time compiler.
OL08-00-040290 V1R3 OL 8 must be configured to prevent unrestricted mail relaying.
OL08-00-040300 V1R3 The OL 8 file integrity tool must be configured to verify extended attributes.
OL08-00-040310 V1R3 The OL 8 file integrity tool must be configured to verify Access Control Lists (ACLs).
OL08-00-040320 V1R3 The graphical display manager must not be installed on OL 8 unless approved.
OL08-00-040330 V1R3 OL 8 network interfaces must not be in promiscuous mode.
OL08-00-040340 V1R3 OL 8 remote X connections for interactive users must be disabled unless to fulfill documented and validated mission requirements.
OL08-00-040341 V1R3 The OL 8 SSH daemon must prevent remote hosts from connecting to the proxy display.
OL08-00-040350 V1R3 If the Trivial File Transfer Protocol (TFTP) server is required, the OL 8 TFTP daemon must be configured to operate in secure mode.
OL08-00-040360 V1R3 A File Transfer Protocol (FTP) server package must not be installed unless mission essential on OL 8.
OL08-00-040370 V1R3 OL 8 must not have the "gssproxy" package installed if not required for operational support.
OL08-00-040380 V1R3 OL 8 must not have the "iprutils" package installed if not required for operational support.
OL08-00-040390 V1R3 OL 8 must not have the "tuned" package installed if not required for operational support.
OL08-00-010121 V1R3 The OL 8 operating system must not have accounts configured with blank or null passwords.
OL08-00-010379 V1R3 OL 8 must specify the default "include" directory for the /etc/sudoers file.
OL08-00-020101 V1R3 OL 8 must ensure the password complexity module is enabled in the system-auth file.
OL08-00-020102 V1R3 OL 8 systems below version 8.4 must ensure the password complexity module in the system-auth file is configured for three retries or less.
OL08-00-020103 V1R3 OL 8 systems below version 8.4 must ensure the password complexity module in the password-auth file is configured for three retries or less.
OL08-00-020104 V1R3 OL 8 systems, version 8.4 and above, must ensure the password complexity module is configured for three retries or less.
OL08-00-040259 V1R3 OL 8 must not enable IPv4 packet forwarding unless the system is a router.
OL08-00-040321 V1R3 The graphical display manager must not be the default target on OL 8 unless approved.
UBTU-18-010032 V2R11 The Ubuntu operating system must display the date and time of the last successful account logon upon logon.
UBTU-18-010150 V2R11 The Ubuntu Operating system must disable the x86 Ctrl-Alt-Delete key sequence if a graphical user interface is installed.
UBTU-18-010151 V2R11 The Ubuntu Operating system must disable the x86 Ctrl-Alt-Delete key sequence.
UBTU-18-010418 V2R11 The Ubuntu operating system must be configured so that remote X connections are disabled, unless to fulfill documented and validated mission requirements.
UBTU-18-010419 V2R11 The Ubuntu operating system SSH daemon must prevent remote hosts from connecting to the proxy display.
UBTU-18-010450 V2R11 All local interactive user home directories defined in the /etc/passwd file must exist.
UBTU-18-010451 V2R11 All local interactive user home directories must have mode 0750 or less permissive.
UBTU-18-010452 V2R11 All local interactive user home directories must be group-owned by the home directory owners primary group.
UBTU-18-010522 V2R11 The Ubuntu operating system must not have accounts configured with blank or null passwords.
UBTU-18-010523 V2R11 The Ubuntu operating system must not allow accounts configured with blank or null passwords.
OL07-00-010020 V2R11 The Oracle Linux operating system must be configured so that the cryptographic hash of system files and commands matches vendor values.
OL07-00-010290 V2R11 The Oracle Linux operating system must not allow accounts configured with blank or null passwords.
OL07-00-020230 V2R11 The Oracle Linux operating system must be configured so that the x86 Ctrl-Alt-Delete key sequence is disabled on the command line.
OL07-00-020250 V2R11 The Oracle Linux operating system must be a vendor supported release.
OL07-00-020260 V2R11 The Oracle Linux operating system security patches and updates must be installed and up to date.
OL07-00-020270 V2R11 The Oracle Linux operating system must not have unnecessary accounts.
OL07-00-020310 V2R11 The Oracle Linux operating system must be configured so that the root account must be the only account having unrestricted access to the system.
OL07-00-020320 V2R11 The Oracle Linux operating system must be configured so that all files and directories have a valid owner.
OL07-00-020330 V2R11 The Oracle Linux operating system must be configured so that all files and directories have a valid group owner.
OL07-00-020610 V2R11 The Oracle Linux operating system must be configured so that all local interactive user accounts, upon creation, are assigned a home directory.
OL07-00-020620 V2R11 The Oracle Linux operating system must be configured so that all local interactive users have a home directory assigned and defined in the /etc/passwd file.
OL07-00-020630 V2R11 The Oracle Linux operating system must be configured so that all local interactive user home directories have mode 0750 or less permissive.
OL07-00-020640 V2R11 The Oracle Linux operating system must be configured so that all local interactive user home directories are owned by their respective users.
OL07-00-020650 V2R11 The Oracle Linux operating system must be configured so that all local interactive user home directories are group-owned by the home directory owners primary group.
OL07-00-020660 V2R11 The Oracle Linux operating system must be configured so that all files and directories contained in local interactive user home directories have a valid owner.
OL07-00-020670 V2R11 The Oracle Linux operating system must be configured so that all files and directories contained in local interactive user home directories are group-owned by a group of which the home directory owner is a member.
OL07-00-020680 V2R11 The Oracle Linux operating system must be configured so that all files and directories contained in local interactive user home directories have a mode of 0750 or less permissive.
OL07-00-020690 V2R11 The Oracle Linux operating system must be configured so that all local initialization files for interactive users are owned by the home directory user or root.
OL07-00-020700 V2R11 The Oracle Linux operating system must be configured so that all local initialization files for local interactive users are be group-owned by the users primary group or root.
OL07-00-020710 V2R11 The Oracle Linux operating system must be configured so that all local initialization files have mode 0740 or less permissive.
OL07-00-020720 V2R11 The Oracle Linux operating system must be configured so that all local interactive user initialization files executable search paths contain only paths that resolve to the users home directory.
OL07-00-020730 V2R11 The Oracle Linux operating system must be configured so that local initialization files do not execute world-writable programs.
OL07-00-020900 V2R11 The Oracle Linux operating system must be configured so that all system device files are correctly labeled to prevent unauthorized modification.
OL07-00-021000 V2R11 The Oracle Linux operating system must be configured so that file systems containing user home directories are mounted to prevent files with the setuid and setgid bit set from being executed.
OL07-00-021010 V2R11 The Oracle Linux operating system must prevent files with the setuid and setgid bit set from being executed on file systems that are used with removable media.
OL07-00-021020 V2R11 The Oracle Linux operating system must prevent files with the setuid and setgid bit set from being executed on file systems that are being imported via Network File System (NFS).
OL07-00-021021 V2R11 The Oracle Linux operating system must prevent binary files from being executed on file systems that are being imported via Network File System (NFS).
OL07-00-021030 V2R11 The Oracle Linux operating system must be configured so that all world-writable directories are group-owned by root, sys, bin, or an application group.
OL07-00-021040 V2R11 The Oracle Linux operating system must set the umask value to 077 for all local interactive user accounts.
OL07-00-021100 V2R11 The Oracle Linux operating system must have cron logging implemented.
OL07-00-021110 V2R11 The Oracle Linux operating system must be configured so that the cron.allow file, if it exists, is owned by root.
OL07-00-021120 V2R11 The Oracle Linux operating system must be configured so that the cron.allow file, if it exists, is group-owned by root.
OL07-00-021300 V2R11 The Oracle Linux operating system must disable Kernel core dumps unless needed.
OL07-00-021310 V2R11 The Oracle Linux operating system must be configured so that a separate file system is used for user home directories (such as /home or an equivalent).
OL07-00-021320 V2R11 The Oracle Linux operating system must use a separate file system for /var.
OL07-00-021340 V2R11 The Oracle Linux operating system must use a separate file system for /tmp (or equivalent).
OL07-00-021600 V2R11 The Oracle Linux operating system must be configured so that the file integrity tool is configured to verify Access Control Lists (ACLs).
OL07-00-021610 V2R11 The Oracle Linux operating system must be configured so that the file integrity tool is configured to verify extended attributes.
OL07-00-021620 V2R11 The Oracle Linux operating system must use a file integrity tool that is configured to use FIPS 140-2 approved cryptographic hashes for validating file contents and directories.
OL07-00-031000 V2R11 The Oracle Linux operating system must send rsyslog output to a log aggregation server.
OL07-00-031010 V2R11 The Oracle Linux operating system must be configured so that the rsyslog daemon does not accept log messages from other servers unless the server is being used for log aggregation.
OL07-00-032000 V2R11 The Oracle Linux operating system must use a virus scan program.
OL07-00-040330 V2R11 The Oracle Linux operating system must be configured so that the SSH daemon does not allow authentication using RSA rhosts authentication.
OL07-00-040350 V2R11 The Oracle Linux operating system must be configured so that the SSH daemon does not allow authentication using rhosts authentication.
OL07-00-040360 V2R11 The Oracle Linux operating system must display the date and time of the last successful account logon upon an SSH logon.
OL07-00-040370 V2R11 The Oracle Linux operating system must not permit direct logons to the root account using remote access via SSH.
OL07-00-040380 V2R11 The Oracle Linux operating system must be configured so that the SSH daemon does not allow authentication using known hosts authentication.
OL07-00-040410 V2R11 The Oracle Linux operating system must be configured so that the SSH public host key files have mode 0644 or less permissive.
OL07-00-040420 V2R11 The Oracle Linux operating system must be configured so the SSH private host key files have mode 0640 or less permissive.
OL07-00-040450 V2R11 The Oracle Linux operating system must be configured so that the SSH daemon performs strict mode checking of home directory configuration files.
OL07-00-040460 V2R11 The Oracle Linux operating system must be configured so that the SSH daemon uses privilege separation.
OL07-00-040470 V2R11 The Oracle Linux operating system must be configured so that the SSH daemon does not allow compression or only allows compression after successful authentication.
OL07-00-040520 V2R11 The Oracle Linux operating system must enable an application firewall, if available.
OL07-00-040530 V2R11 The Oracle Linux operating system must display the date and time of the last successful account logon upon logon.
OL07-00-040540 V2R11 The Oracle Linux operating system must not contain .shosts files.
OL07-00-040550 V2R11 The Oracle Linux operating system must not contain shosts.equiv files.
OL07-00-040600 V2R11 For Oracle Linux operating systems using DNS resolution, at least two name servers must be configured.
OL07-00-040610 V2R11 The Oracle Linux operating system must not forward Internet Protocol version 4 (IPv4) source-routed packets.
OL07-00-040611 V2R11 The Oracle Linux operating system must use a reverse-path filter for IPv4 network traffic when possible on all interfaces.
OL07-00-040612 V2R11 The Oracle Linux operating system must use a reverse-path filter for IPv4 network traffic when possible by default.
OL07-00-040620 V2R11 The Oracle Linux operating system must not forward Internet Protocol version 4 (IPv4) source-routed packets by default.
OL07-00-040630 V2R11 The Oracle Linux operating system must not respond to Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) echoes sent to a broadcast address.
OL07-00-040640 V2R11 The Oracle Linux operating system must prevent Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirect messages from being accepted.
OL07-00-040641 V2R11 The Oracle Linux operating system must ignore Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirect messages.
OL07-00-040650 V2R11 The Oracle Linux operating system must not allow interfaces to perform Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirects by default.
OL07-00-040660 V2R11 The Oracle Linux operating system must not send Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirects.
OL07-00-040670 V2R11 Network interfaces configured on The Oracle Linux operating system must not be in promiscuous mode.
OL07-00-040680 V2R11 The Oracle Linux operating system must be configured to prevent unrestricted mail relaying.
OL07-00-040690 V2R11 The Oracle Linux operating system must not have a File Transfer Protocol (FTP) server package installed unless needed.
OL07-00-040700 V2R11 The Oracle Linux operating system must not have the Trivial File Transfer Protocol (TFTP) server package installed if not required for operational support.
OL07-00-040710 V2R11 The Oracle Linux operating system must be configured so that remote X connections are disabled, unless to fulfill documented and validated mission requirements.
OL07-00-040720 V2R11 The Oracle Linux operating system must be configured so that if the Trivial File Transfer Protocol (TFTP) server is required, the TFTP daemon is configured to operate in secure mode.
OL07-00-040730 V2R11 The Oracle Linux operating system must not have a graphical display manager installed unless approved.
OL07-00-040740 V2R11 The Oracle Linux operating system must not be performing packet forwarding unless the system is a router.
OL07-00-040750 V2R11 The Oracle Linux operating system must be configured so that the Network File System (NFS) is configured to use RPCSEC_GSS.
OL07-00-040800 V2R11 SNMP community strings on the Oracle Linux operating system must be changed from the default.
OL07-00-040810 V2R11 The Oracle Linux operating system access control program must be configured to grant or deny system access to specific hosts and services.
OL07-00-040820 V2R11 The Oracle Linux operating system must not have unauthorized IP tunnels configured.
OL07-00-040830 V2R11 The Oracle Linux operating system must not forward IPv6 source-routed packets.
OL07-00-020231 V2R11 The Oracle Linux operating system must be configured so the x86 Ctrl-Alt-Delete key sequence is disabled in the Graphical User Interface.
OL07-00-021031 V2R11 The Oracle Linux operating system must be configured so that all world-writable directories are owned by root, sys, bin, or an application user.
OL07-00-040711 V2R11 The Oracle Linux operating system SSH daemon must prevent remote hosts from connecting to the proxy display.
OL07-00-010341 V2R11 The Oracle Linux operating system must restrict privilege elevation to authorized personnel.
OL07-00-010342 V2R11 The Oracle Linux operating system must use the invoking user's password for privilege escalation when using "sudo".
OL07-00-010291 V2R11 The Oracle Linux operating system must not have accounts configured with blank or null passwords.
OL07-00-010339 V2R11 The Oracle Linux operating system must specify the default "include" directory for the /etc/sudoers file.
OL07-00-010063 V2R11 The Oracle Linux operating system must disable the login screen user list for graphical user interfaces.