SRG-OS-000104-GPOS-00051 Controls

STIG IDVersionTitleProduct
ALMA-09-032910V1R1Groups must have unique Group IDs (GIDs).
ALMA-09-033020V1R1Duplicate User IDs (UIDs) must not exist for interactive users.
ALMA-09-033130V1R1All AlmaLinux OS 9 interactive users must have a primary group that exists.
UBTU-18-010444V2R15The Ubuntu operating system must uniquely identify interactive users.
UBTU-20-010010V1R9The Ubuntu operating system must uniquely identify interactive users.
UBTU-24-400000V1R1Ubuntu 24.04 LTS must uniquely identify interactive users.
WN22-00-000070V2R1Windows Server 2022 shared user accounts must not be permitted.
WN22-00-000200V2R1Windows Server 2022 accounts must require passwords.
WN10-SO-000005V2R8The built-in administrator account must be disabled.
APPL-15-000090V1R1The macOS system must disable login to other users' active and locked sessions.
APPL-15-000100V1R1The macOS system must disable root login.
APPL-15-002066V1R1The macOS system must disable unattended or automatic login to the system.
APPL-15-005052V1R1The macOS system must configure the login window to prompt for username and password.
APPL-14-000090V2R1The macOS system must disable logon to other user's active and locked sessions.
APPL-14-000100V2R1The macOS system must disable root logon.
APPL-14-005052V2R1The macOS system must configure login window to prompt for username and password.
WN11-SO-000005V2R1The built-in administrator account must be disabled.
UBTU-22-411015V2R1Ubuntu 22.04 LTS must uniquely identify interactive users.
RHEL-08-020240V1R9RHEL 8 duplicate User IDs (UIDs) must not exist for interactive users.
RHEL-07-010500V3R8The Red Hat Enterprise Linux operating system must uniquely identify and must authenticate organizational users (or processes acting on behalf of organizational users) using multifactor authentication.
RHEL-07-020300V3R8The Red Hat Enterprise Linux operating system must be configured so that all Group Identifiers (GIDs) referenced in the /etc/passwd file are defined in the /etc/group file.
RHEL-09-411030V2R1RHEL 9 duplicate User IDs (UIDs) must not exist for interactive users.
RHEL-09-411045V2R1All RHEL 9 interactive users must have a primary group that exists.
RHEL-09-411110V2R1RHEL 9 groups must have unique Group ID (GID).
RHEL-09-611160V2R1RHEL 9 must use the common access card (CAC) smart card driver.
OL09-00-000940V1R1OL 9 must use the CAC smart card driver.
OL09-00-003001V1R1OL 9 duplicate User IDs (UIDs) must not exist for interactive users.
OL09-00-003005V1R1OL 9 interactive users must have a primary group that exists.
OL09-00-003006V1R1OL 9 groups must have unique Group ID (GID).
WN16-00-000080V2R10Shared user accounts must not be permitted on the system.
WN16-00-000210V2R10Outdated or unused accounts must be removed from the system or disabled.
WN16-00-000220V2R10Windows Server 2016 accounts must require passwords.
SLES-15-010230V1R9The SUSE operating system must not have duplicate User IDs (UIDs) for interactive users.
SLES-12-010640V2R13The SUSE operating system must not have duplicate User IDs (UIDs) for interactive users.
OL07-00-010500V2R14The Oracle Linux operating system must uniquely identify and must authenticate organizational users (or processes acting on behalf of organizational users) using multifactor authentication.
OL07-00-020300V2R14The Oracle Linux operating system must be configured so that all Group Identifiers (GIDs) referenced in the /etc/passwd file are defined in the /etc/group file.
WN19-00-000070V2R8Windows Server 2019 shared user accounts must not be permitted.
WN19-00-000200V2R8Windows Server 2019 accounts must require passwords.