SRG-OS-000138-GPOS-00069 Controls

STIG IDVersionTitleProduct
ALMA-09-042150V1R1Any AlmaLinux OS 9 world-writable directories must be owned by root, sys, bin, or an application user.
ALMA-09-042260V1R1A sticky bit must be set on all AlmaLinux OS 9 public directories.
UBTU-18-010120V2R15The Ubuntu operating system must set a sticky bit on all public directories to prevent unauthorized and unintended information transferred via shared system resources.
UBTU-18-010510V2R15The Ubuntu operating system must restrict access to the kernel message buffer.
UBTU-20-010411V1R9The Ubuntu operating system must set a sticky bit on all public directories to prevent unauthorized and unintended information transferred via shared system resources.
UBTU-20-010401V1R9The Ubuntu operating system must restrict access to the kernel message buffer.
UBTU-24-600140V1R1Ubuntu 24.04 LTS must restrict access to the kernel message buffer.
UBTU-24-600150V1R1Ubuntu 24.04 LTS must set a sticky bit on all public directories to prevent unauthorized and unintended information transferred via shared system resources.
WN22-00-000230V2R1Windows Server 2022 nonsystem-created file shares must limit access to groups that require it.
WN22-CC-000350V2R1Windows Server 2022 Remote Desktop Services must prevent drive redirection.
WN22-DC-000120V2R1Windows Server 2022 data files owned by users must be on a different logical partition from the directory server data files.
WN22-SO-000230V2R1Windows Server 2022 must not allow anonymous enumeration of shares.
WN22-SO-000250V2R1Windows Server 2022 must restrict anonymous access to Named Pipes and Shares.
WN10-00-000060V2R8Non system-created file shares on a system must limit access to groups that require it.
WN10-CC-000155V2R8Solicited Remote Assistance must not be allowed.
WN10-CC-000275V2R8Local drives must be prevented from sharing with Remote Desktop Session Hosts.
WN10-EP-000310V2R8Windows 10 Kernel (Direct Memory Access) DMA Protection must be enabled.
WN10-SO-000150V2R8Anonymous enumeration of shares must be restricted.
WN10-SO-000165V2R8Anonymous access to Named Pipes and Shares must be restricted.
WN11-00-000060V2R1Non-system-created file shares on a system must limit access to groups that require it.
WN11-CC-000155V2R1Solicited Remote Assistance must not be allowed.
WN11-CC-000275V2R1Local drives must be prevented from sharing with Remote Desktop Session Hosts.
WN11-SO-000150V2R1Anonymous enumeration of shares must be restricted.
WN11-SO-000165V2R1Anonymous access to Named Pipes and Shares must be restricted.
UBTU-22-213010V2R1Ubuntu 22.04 LTS must restrict access to the kernel message buffer.
UBTU-22-232145V2R1Ubuntu 22.04 LTS must set a sticky bit on all public directories to prevent unauthorized and unintended information transferred via shared system resources.
RHEL-08-010190V1R9A sticky bit must be set on all RHEL 8 public directories to prevent unauthorized and unintended information transferred via shared system resources.
RHEL-08-010375V1R9RHEL 8 must restrict access to the kernel message buffer.
RHEL-08-010376V1R9RHEL 8 must prevent kernel profiling by unprivileged users.
RHEL-07-010375V3R14The Red Hat Enterprise Linux operating system must restrict access to the kernel message buffer.
RHEL-09-232245V2R1A sticky bit must be set on all RHEL 9 public directories.
OL09-00-002510V1R1OL 9 must be configured so that a sticky bit must be set on all public directories.
OL09-00-002516V1R1OL 9 world-writable directories must be owned by root, sys, bin, or an application user.
WN16-00-000250V2R10Non-system-created file shares on a system must limit access to groups that require it.
WN16-CC-000380V2R10Local drives must be prevented from sharing with Remote Desktop Session Hosts.
WN16-DC-000120V2R10Data files owned by users must be on a different logical partition from the directory server data files.
WN16-SO-000270V2R10Anonymous enumeration of shares must not be allowed.
WN16-SO-000300V2R10Anonymous access to Named Pipes and Shares must be restricted.
SLES-15-010300V1R9The sticky bit must be set on all SUSE operating system world-writable directories.
SLES-15-010375V1R9The SUSE operating system must restrict access to the kernel message buffer.
SLES-12-010460V2R13The sticky bit must be set on all SUSE operating system world-writable directories.
SLES-12-010375V2R13The SUSE operating system must restrict access to the kernel message buffer.
OL07-00-010375V2R14The Oracle Linux operating system must restrict access to the kernel message buffer.
WN19-00-000230V2R8Windows Server 2019 non-system-created file shares must limit access to groups that require it.
WN19-CC-000350V2R8Windows Server 2019 Remote Desktop Services must prevent drive redirection.
WN19-DC-000120V2R8Windows Server 2019 data files owned by users must be on a different logical partition from the directory server data files.
WN19-SO-000230V2R8Windows Server 2019 must not allow anonymous enumeration of shares.
WN19-SO-000250V2R8Windows Server 2019 must restrict anonymous access to Named Pipes and Shares.
OL08-00-010190V1R9A sticky bit must be set on all OL 8 public directories to prevent unauthorized and unintended information transferred via shared system resources.
OL08-00-010375V1R9OL 8 must restrict access to the kernel message buffer.
OL08-00-010376V1R9OL 8 must prevent kernel profiling by unprivileged users.