SRG-OS-000080-GPOS-00048 Controls

STIG IDVersionTitleProduct
ALMA-09-006180V1R1AlmaLinux OS 9 must require authentication to access emergency mode.
ALMA-09-006290V1R1AlmaLinux OS 9 must require a boot loader password.
ALMA-09-006400V1R1AlmaLinux OS 9 must require a unique superuser's name upon booting into single-user and maintenance modes.
ALMA-09-006510V1R1AlmaLinux OS 9 must require authentication to access single-user mode.
UBTU-18-010000V2R15Ubuntu operating systems booted with a BIOS must require authentication upon booting into single-user and maintenance modes.
UBTU-18-010001V2R15Ubuntu operating systems booted with United Extensible Firmware Interface (UEFI) implemented must require authentication upon booting into single-user mode and maintenance.
UBTU-20-010009V1R9Ubuntu operating systems when booted must require authentication upon booting into single-user and maintenance modes.
UBTU-24-102000V1R1Ubuntu 24.04 LTS when booted must require authentication upon booting into single-user and maintenance modes.
WN22-00-000130V2R1Windows Server 2022 local volumes must use a format that supports NTFS attributes.
WN22-00-000180V2R1Windows Server 2022 nonadministrative accounts or groups must only have print permissions on printer shares.
WN22-DC-000340V2R1Windows Server 2022 Access this computer from the network user right must only be assigned to the Administrators, Authenticated Users, and Enterprise Domain Controllers groups on domain controllers.
WN22-DC-000360V2R1Windows Server 2022 Allow log on through Remote Desktop Services user right must only be assigned to the Administrators group on domain controllers.
WN22-DC-000370V2R1Windows Server 2022 Deny access to this computer from the network user right on domain controllers must be configured to prevent unauthenticated access.
WN22-DC-000380V2R1Windows Server 2022 Deny log on as a batch job user right on domain controllers must be configured to prevent unauthenticated access.
WN22-DC-000390V2R1Windows Server 2022 Deny log on as a service user right must be configured to include no accounts or groups (blank) on domain controllers.
WN22-DC-000400V2R1Windows Server 2022 Deny log on locally user right on domain controllers must be configured to prevent unauthenticated access.
WN22-MS-000070V2R1Windows Server 2022 Access this computer from the network user right must only be assigned to the Administrators and Authenticated Users groups on domain-joined member servers and standalone or nondomain-joined systems.
WN22-MS-000080V2R1Windows Server 2022 Deny access to this computer from the network user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts and local accounts and from unauthenticated access on all systems.
WN22-MS-000090V2R1Windows Server 2022 Deny log on as a batch job user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts and from unauthenticated access on all systems.
WN22-MS-000100V2R1Windows Server 2022 Deny log on as a service user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts. No other groups or accounts must be assigned this right.
WN22-MS-000110V2R1Windows Server 2022 Deny log on locally user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts and from unauthenticated access on all systems.
WN22-UR-000030V2R1Windows Server 2022 Allow log on locally user right must only be assigned to the Administrators group.
WN10-00-000050V2R8Local volumes must be formatted using NTFS.
WN10-UR-000010V2R8The Access this computer from the network user right must only be assigned to the Administrators and Remote Desktop Users groups.
WN10-UR-000025V2R8The Allow log on locally user right must only be assigned to the Administrators and Users groups.
WN10-UR-000070V2R8The Deny access to this computer from the network user right on workstations must be configured to prevent access from highly privileged domain accounts and local accounts on domain systems and unauthenticated access on all systems.
WN10-UR-000075V2R8The "Deny log on as a batch job" user right on domain-joined workstations must be configured to prevent access from highly privileged domain accounts.
WN10-UR-000080V2R8The Deny log on as a service user right on Windows 10 domain-joined workstations must be configured to prevent access from highly privileged domain accounts.
WN10-UR-000085V2R8The Deny log on locally user right on workstations must be configured to prevent access from highly privileged domain accounts on domain systems and unauthenticated access on all systems.
WN10-UR-000090V2R8The Deny log on through Remote Desktop Services user right on Windows 10 workstations must at a minimum be configured to prevent access from highly privileged domain accounts and local accounts on domain systems and unauthenticated access on all systems.
APPL-15-000033V1R1The macOS system must disable FileVault automatic login.
APPL-15-002001V1R1The macOS system must disable Server Message Block (SMB) sharing.
APPL-15-002003V1R1The macOS system must disable Network File System (NFS) service.
APPL-15-002006V1R1The macOS system must disable Unix-to-Unix Copy Protocol (UUCP) service.
APPL-15-002008V1R1The macOS system must disable the built-in web server.
APPL-15-002009V1R1The macOS system must disable AirDrop.
APPL-15-002022V1R1The macOS system must disable Remote Apple Events.
APPL-15-002050V1R1The macOS system must disable Screen Sharing and Apple Remote Desktop.
APPL-15-002100V1R1The macOS system must disable Media Sharing.
APPL-15-002110V1R1The macOS system must disable Bluetooth Sharing.
APPL-15-005058V1R1The macOS system must disable Handoff.
APPL-15-005070V1R1The macOS system must enable Authenticated Root.
APPL-14-000033V2R1The macOS system must disable FileVault automatic log on.
APPL-14-000080V2R1The macOS system must enable SSH server for remote access sessions.
APPL-14-002001V2R1The macOS system must disable Server Message Block sharing.
APPL-14-002003V2R1The macOS system must disable Network File System service.
APPL-14-002006V2R1The macOS system must disable Unix-to-Unix Copy Protocol service.
APPL-14-002008V2R1The macOS system must disable the built-in web server.
APPL-14-002009V2R1The macOS system must disable AirDrop.
APPL-14-002022V2R1The macOS system must disable Remote Apple Events.
APPL-14-002050V2R1The macOS system must disable Screen Sharing and Apple Remote Desktop.
APPL-14-002100V2R1The macOS system must disable Media Sharing.
APPL-14-002110V2R1The macOS system must disable Bluetooth sharing.
APPL-14-005058V2R1The macOS system must disable Handoff.
APPL-14-005070V2R1The macOS system must enable Authenticated Root.
WN11-00-000050V2R1Local volumes must be formatted using NTFS.
WN11-UR-000010V2R1The "Access this computer from the network" user right must only be assigned to the Administrators and Remote Desktop Users groups.
WN11-UR-000025V2R1The "Allow log on locally" user right must only be assigned to the Administrators and Users groups.
WN11-UR-000070V2R1The "Deny access to this computer from the network" user right on workstations must be configured to prevent access from highly privileged domain accounts and local accounts on domain systems and unauthenticated access on all systems.
WN11-UR-000075V2R1The "Deny log on as a batch job" user right on domain-joined workstations must be configured to prevent access from highly privileged domain accounts.
WN11-UR-000080V2R1The "Deny log on as a service" user right on Windows 11 domain-joined workstations must be configured to prevent access from highly privileged domain accounts.
WN11-UR-000085V2R1The "Deny log on locally" user right on workstations must be configured to prevent access from highly privileged domain accounts on domain systems and unauthenticated access on all systems.
WN11-UR-000090V2R1The "Deny log on through Remote Desktop Services" user right on Windows 11 workstations must be configured to prevent access from highly privileged domain accounts and local accounts on domain systems and unauthenticated access on all systems.
UBTU-22-212010V2R1Ubuntu 22.04 LTS, when booted, must require authentication upon booting into single-user and maintenance modes.
RHEL-08-010140V1R9RHEL 8 operating systems booted with United Extensible Firmware Interface (UEFI) must require authentication upon booting into single-user mode and maintenance.
RHEL-08-010150V1R9RHEL 8 operating systems booted with a BIOS must require authentication upon booting into single-user and maintenance modes.
RHEL-08-010151V1R9RHEL 8 operating systems must require authentication upon booting into rescue mode.
RHEL-08-010141V1R9RHEL 8 operating systems booted with United Extensible Firmware Interface (UEFI) must require a unique superusers name upon booting into single-user mode and maintenance.
RHEL-08-010149V1R9RHEL 8 operating systems booted with a BIOS must require a unique superusers name upon booting into single-user and maintenance modes.
RHEL-08-010152V1R9RHEL 8 operating systems must require authentication upon booting into emergency mode.
RHEL-07-010481V3R8The Red Hat Enterprise Linux operating system must require authentication upon booting into single-user and maintenance modes.
RHEL-07-010482V3R8Red Hat Enterprise Linux operating systems version 7.2 or newer with a Basic Input/Output System (BIOS) must require authentication upon booting into single-user and maintenance modes.
RHEL-07-010491V3R8Red Hat Enterprise Linux operating systems version 7.2 or newer using Unified Extensible Firmware Interface (UEFI) must require authentication upon booting into single-user and maintenance modes.
RHEL-07-010483V3R8Red Hat Enterprise Linux operating systems version 7.2 or newer booted with a BIOS must have a unique name for the grub superusers account when booting into single-user and maintenance modes.
RHEL-07-010492V3R8Red Hat Enterprise Linux operating systems version 7.2 or newer booted with United Extensible Firmware Interface (UEFI) must have a unique name for the grub superusers account when booting into single-user mode and maintenance.
RHEL-09-212010V2R1RHEL 9 must require a boot loader superuser password.
RHEL-09-212020V2R1RHEL 9 must require a unique superusers name upon booting into single-user and maintenance modes.
RHEL-09-611195V2R1RHEL 9 must require authentication to access emergency mode.
RHEL-09-611200V2R1RHEL 9 must require authentication to access single-user mode.
OL09-00-000025V1R1OL 9 must require authentication to access emergency mode.
OL09-00-000030V1R1OL 9 must require authentication to access single-user mode.
OL09-00-000050V1R1OL 9 must require a unique superuser's name upon booting into single-user and maintenance modes.
OL09-00-001115V1R1OL 9 must require a boot loader superuser password.
WN16-00-000150V2R10Local volumes must use a format that supports NTFS attributes.
WN16-00-000200V2R10Non-administrative accounts or groups must only have print permissions on printer shares.
WN16-DC-000340V2R10The Access this computer from the network user right must only be assigned to the Administrators, Authenticated Users, and Enterprise Domain Controllers groups on domain controllers.
WN16-DC-000360V2R10The Allow log on through Remote Desktop Services user right must only be assigned to the Administrators group.
WN16-DC-000370V2R10The Deny access to this computer from the network user right on domain controllers must be configured to prevent unauthenticated access.
WN16-DC-000380V2R10The Deny log on as a batch job user right on domain controllers must be configured to prevent unauthenticated access.
WN16-DC-000390V2R10The Deny log on as a service user right must be configured to include no accounts or groups (blank) on domain controllers.
WN16-DC-000400V2R10The Deny log on locally user right on domain controllers must be configured to prevent unauthenticated access.
WN16-MS-000340V2R10The "Access this computer from the network" user right must only be assigned to the Administrators and Authenticated Users groups on member servers.
WN16-MS-000370V2R10The "Deny access to this computer from the network" user right on member servers must be configured to prevent access from highly privileged domain accounts and local accounts on domain systems and from unauthenticated access on all systems.
WN16-MS-000380V2R10The "Deny log on as a batch job" user right on member servers must be configured to prevent access from highly privileged domain accounts on domain systems and from unauthenticated access on all systems.
WN16-MS-000390V2R10The "Deny log on as a service" user right on member servers must be configured to prevent access from highly privileged domain accounts on domain systems. No other groups or accounts must be assigned this right.
WN16-MS-000400V2R10The "Deny log on locally" user right on member servers must be configured to prevent access from highly privileged domain accounts on domain systems and from unauthenticated access on all systems.
WN16-UR-000050V2R10The Allow log on locally user right must only be assigned to the Administrators group.
WN16-DC-000401V2R10Windows Server 2016 must be configured for name-based strong mappings for certificates.
SLES-15-010190V1R9SUSE operating systems with a basic input/output system (BIOS) must require authentication upon booting into single-user and maintenance modes.
SLES-15-010200V1R9SUSE operating systems with Unified Extensible Firmware Interface (UEFI) implemented must require authentication upon booting into single-user mode and maintenance.
SLES-12-010430V2R13SUSE operating systems with a basic input/output system (BIOS) must require authentication upon booting into single-user and maintenance modes.
SLES-12-010440V2R13SUSE operating systems with Unified Extensible Firmware Interface (UEFI) implemented must require authentication upon booting into single-user mode and maintenance.
OL07-00-010481V2R14The Oracle Linux operating system must require authentication upon booting into single-user and maintenance modes.
OL07-00-010482V2R14Oracle Linux operating systems version 7.2 or newer with a Basic Input/Output System (BIOS) must require authentication upon booting into single-user and maintenance modes.
OL07-00-010491V2R14Oracle Linux operating systems version 7.2 or newer using Unified Extensible Firmware Interface (UEFI) must require authentication upon booting into single-user and maintenance modes.
OL07-00-010483V2R14Oracle Linux operating systems version 7.2 or newer booted with a BIOS must have a unique name for the grub superusers account when booting into single-user and maintenance modes.
OL07-00-010492V2R14Oracle Linux operating systems version 7.2 or newer booted with United Extensible Firmware Interface (UEFI) must have a unique name for the grub superusers account when booting into single-user mode and maintenance.
WN19-00-000130V2R8Windows Server 2019 local volumes must use a format that supports NTFS attributes.
WN19-00-000180V2R8Windows Server 2019 non-administrative accounts or groups must only have print permissions on printer shares.
WN19-DC-000340V2R8Windows Server 2019 Access this computer from the network user right must only be assigned to the Administrators, Authenticated Users, and Enterprise Domain Controllers groups on domain controllers.
WN19-DC-000360V2R8Windows Server 2019 Allow log on through Remote Desktop Services user right must only be assigned to the Administrators group on domain controllers.
WN19-DC-000370V2R8Windows Server 2019 Deny access to this computer from the network user right on domain controllers must be configured to prevent unauthenticated access.
WN19-DC-000380V2R8Windows Server 2019 Deny log on as a batch job user right on domain controllers must be configured to prevent unauthenticated access.
WN19-DC-000390V2R8Windows Server 2019 Deny log on as a service user right must be configured to include no accounts or groups (blank) on domain controllers.
WN19-DC-000400V2R8Windows Server 2019 Deny log on locally user right on domain controllers must be configured to prevent unauthenticated access.
WN19-MS-000070V2R8Windows Server 2019 "Access this computer from the network" user right must only be assigned to the Administrators and Authenticated Users groups on domain-joined member servers and standalone or nondomain-joined systems.
WN19-MS-000080V2R8Windows Server 2019 "Deny access to this computer from the network" user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts and local accounts and from unauthenticated access on all systems.
WN19-MS-000090V2R8Windows Server 2019 "Deny log on as a batch job" user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts and from unauthenticated access on all systems.
WN19-MS-000100V2R8Windows Server 2019 "Deny log on as a service" user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts. No other groups or accounts must be assigned this right.
WN19-MS-000110V2R8Windows Server 2019 "Deny log on locally" user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts and from unauthenticated access on all systems.
WN19-UR-000030V2R8Windows Server 2019 Allow log on locally user right must only be assigned to the Administrators group.
OL08-00-010140V1R9OL 8 operating systems booted with United Extensible Firmware Interface (UEFI) must require authentication upon booting into single-user mode and maintenance.
OL08-00-010141V1R9OL 8 operating systems booted with United Extensible Firmware Interface (UEFI) must have a unique name for the grub superusers account when booting into single-user mode and maintenance.
OL08-00-010149V1R9OL 8 operating systems booted with a BIOS must have a unique name for the grub superusers account when booting into single-user and maintenance modes.
OL08-00-010150V1R9OL 8 operating systems booted with a BIOS must require authentication upon booting into single-user and maintenance modes.
OL08-00-010151V1R9OL 8 operating systems must require authentication upon booting into rescue mode.
OL08-00-010152V1R9OL 8 operating systems must require authentication upon booting into emergency mode.