SRG-OS-000480-GPOS-00227 Controls

STIG IDVersionTitleProduct
ALMA-09-011240V1R1AlmaLinux OS 9 must disable core dumps for all users.
ALMA-09-011350V1R1AlmaLinux OS 9 must disable acquiring, saving, and processing core dumps.
ALMA-09-011460V1R1AlmaLinux OS 9 must disable storing core dumps.
ALMA-09-011570V1R1AlmaLinux OS 9 must disable core dump backtraces.
ALMA-09-011680V1R1AlmaLinux OS 9 must disable the kernel.core_pattern.
ALMA-09-011790V1R1AlmaLinux OS 9 cron configuration files directory must be group-owned by root.
ALMA-09-011900V1R1AlmaLinux OS 9 cron configuration files directory must be owned by root.
ALMA-09-012010V1R1AlmaLinux OS 9 cron configuration directories must have a mode of 0700 or less permissive.
ALMA-09-012120V1R1AlmaLinux OS 9 /etc/crontab file must have mode 0600.
ALMA-09-012230V1R1AlmaLinux OS 9 must disable the ability of a user to accidentally press Ctrl-Alt-Del and cause a system to shut down or reboot.
ALMA-09-012340V1R1AlmaLinux OS 9 must prevent a user from overriding the Ctrl-Alt-Del sequence settings for the graphical user interface.
ALMA-09-012450V1R1All AlmaLinux OS 9 local files and directories must have a valid group owner.
ALMA-09-012560V1R1All AlmaLinux OS 9 local files and directories must have a valid owner.
ALMA-09-012670V1R1AlmaLinux OS 9 /etc/group- file must be group owned by root.
ALMA-09-012780V1R1AlmaLinux OS 9 /etc/group- file must be owned by root.
ALMA-09-012890V1R1AlmaLinux OS 9 /etc/group- file must have mode 0644 or less permissive to prevent unauthorized access.
ALMA-09-013000V1R1AlmaLinux OS 9 /etc/group file must be group owned by root.
ALMA-09-013110V1R1AlmaLinux OS 9 /etc/group file must be owned by root.
ALMA-09-013220V1R1AlmaLinux OS 9 /etc/group file must have mode 0644 or less permissive to prevent unauthorized access.
ALMA-09-013330V1R1The /boot/grub2/grub.cfg file must be group-owned by root.
ALMA-09-013440V1R1The /boot/grub2/grub.cfg file must be owned by root.
ALMA-09-013550V1R1AlmaLinux OS 9 must disable the ability of systemd to spawn an interactive boot process.
ALMA-09-013660V1R1AlmaLinux OS 9 /etc/gshadow- file must be group-owned by root.
ALMA-09-013770V1R1AlmaLinux OS 9 /etc/gshadow- file must be owned by root.
ALMA-09-013880V1R1AlmaLinux OS 9 /etc/gshadow- file must have mode 0000 or less permissive to prevent unauthorized access.
ALMA-09-013990V1R1AlmaLinux OS 9 /etc/gshadow file must be group-owned by root.
ALMA-09-014100V1R1AlmaLinux OS 9 /etc/gshadow file must be owned by root.
ALMA-09-014210V1R1AlmaLinux OS 9 /etc/gshadow file must have mode 0000 or less permissive to prevent unauthorized access.
ALMA-09-014320V1R1The graphical display manager must not be the default target on AlmaLinux OS 9 unless approved.
ALMA-09-014430V1R1AlmaLinux OS 9 must disable the user list at logon for graphical user interfaces.
ALMA-09-015640V1R1AlmaLinux OS 9 must enforce a delay of at least four seconds between logon prompts following a failed logon attempt.
ALMA-09-015750V1R1AlmaLinux OS 9 must not allow blank or null passwords.
ALMA-09-015860V1R1AlmaLinux OS 9 must not have accounts configured with blank or null passwords.
ALMA-09-015970V1R1AlmaLinux OS 9 /etc/passwd- file must be group-owned by root.
ALMA-09-016080V1R1AlmaLinux OS 9 /etc/passwd- file must be owned by root.
ALMA-09-016190V1R1AlmaLinux OS 9 /etc/passwd- file must have mode 0644 or less permissive to prevent unauthorized access.
ALMA-09-016300V1R1AlmaLinux OS 9 /etc/passwd file must be group-owned by root.
ALMA-09-016410V1R1AlmaLinux OS 9 /etc/passwd file must be owned by root.
ALMA-09-016520V1R1AlmaLinux OS 9 /etc/passwd file must have mode 0644 or less permissive to prevent unauthorized access.
ALMA-09-016630V1R1AlmaLinux OS 9 /etc/shadow- file must be group-owned by root.
ALMA-09-016740V1R1AlmaLinux OS 9 /etc/shadow- file must be owned by root.
ALMA-09-016850V1R1AlmaLinux OS 9 /etc/shadow- file must have mode 0000 or less permissive to prevent unauthorized access.
ALMA-09-016960V1R1AlmaLinux OS 9 /etc/shadow file must be group-owned by root.
ALMA-09-017070V1R1AlmaLinux OS 9 /etc/shadow file must be owned by root.
ALMA-09-017180V1R1AlmaLinux OS 9 /etc/shadow file must have mode 0000 to prevent unauthorized access.
ALMA-09-017290V1R1AlmaLinux OS 9 must restrict privilege elevation to authorized personnel.
ALMA-09-017400V1R1AlmaLinux OS 9 must use the invoking user's password for privilege escalation when using "sudo".
ALMA-09-017950V1R1AlmaLinux OS 9 must not have unauthorized accounts.
ALMA-09-018060V1R1AlmaLinux OS 9 must be configured so that the file integrity tool verifies Access Control Lists (ACLs).
ALMA-09-018170V1R1AlmaLinux OS 9 must use a file integrity tool that is configured to use FIPS 140-3-approved cryptographic hashes for validating file contents and directories.
ALMA-09-018280V1R1AlmaLinux OS 9 must be configured so that the file integrity tool verifies extended attributes.
ALMA-09-018500V1R1AlmaLinux OS 9 must not accept router advertisements on all IPv6 interfaces.
ALMA-09-018610V1R1AlmaLinux OS 9 must ignore Internet Control Message Protocol (ICMP) redirect messages.
ALMA-09-018830V1R1AlmaLinux OS 9 firewall must employ a deny-all, allow-by-exception policy for allowing connections to other systems.
ALMA-09-018940V1R1AlmaLinux OS 9 must limit the number of bogus Internet Control Message Protocol (ICMP) response errors logs.
ALMA-09-019050V1R1AlmaLinux OS 9 must not respond to Internet Control Message Protocol (ICMP) echoes sent to a broadcast address.
ALMA-09-019160V1R1AlmaLinux OS 9 must not enable IP packet forwarding unless the system is a router.
ALMA-09-019270V1R1AlmaLinux OS 9 must not have unauthorized IP tunnels configured.
ALMA-09-019380V1R1AlmaLinux OS 9 must log packets with impossible addresses.
ALMA-09-019490V1R1AlmaLinux OS 9 must be configured to prevent unrestricted mail relaying.
ALMA-09-019600V1R1AlmaLinux OS 9 must have the nss-tools package installed.
ALMA-09-019710V1R1AlmaLinux OS 9 network interfaces must not be in promiscuous mode.
ALMA-09-019820V1R1AlmaLinux OS 9 must use reverse path filtering on all IP interfaces.
ALMA-09-019930V1R1AlmaLinux OS 9 must not send Internet Control Message Protocol (ICMP) redirects.
ALMA-09-020040V1R1There must be no .shosts files on AlmaLinux OS 9.
ALMA-09-020150V1R1There must be no shosts.equiv files on AlmaLinux OS 9.
ALMA-09-020260V1R1AlmaLinux OS 9 must not forward source-routed packets.
ALMA-09-020370V1R1AlmaLinux OS 9 SSH daemon must not allow compression or must only allow compression after successful authentication.
ALMA-09-020480V1R1The AlmaLinux OS 9 SSH server configuration file must be group-owned by root.
ALMA-09-020590V1R1The AlmaLinux OS 9 SSH server configuration file must be owned by root.
ALMA-09-020700V1R1AlmaLinux OS 9 SSH server configuration files must have mode 0600 or less permissive.
ALMA-09-020810V1R1AlmaLinux OS 9 must not allow a noncertificate trusted host SSH logon to the system.
ALMA-09-020920V1R1AlmaLinux OS 9 SSH private host key files must have mode 0640 or less permissive.
ALMA-09-021030V1R1AlmaLinux OS 9 SSH public host key files must have mode 0644 or less permissive.
ALMA-09-021140V1R1AlmaLinux OS 9 SSH daemon must not allow known hosts authentication.
ALMA-09-021250V1R1AlmaLinux OS 9 SSH daemon must display the date and time of the last successful account logon upon an SSH logon.
ALMA-09-021360V1R1AlmaLinux OS 9 SSH daemon must not allow rhosts authentication.
ALMA-09-021470V1R1AlmaLinux OS 9 SSH daemon must disable remote X connections for interactive users.
ALMA-09-021580V1R1AlmaLinux OS 9 SSH daemon must prevent remote hosts from connecting to the proxy display.
ALMA-09-021690V1R1If the Trivial File Transfer Protocol (TFTP) server is required, the TFTP daemon must be configured to operate in secure mode.
ALMA-09-021800V1R1AlmaLinux OS 9 must enable hardening for the Berkeley Packet Filter (BPF) just-in-time (JIT) compiler.
ALMA-09-021910V1R1AlmaLinux OS 9 effective dconf policy must match the policy keyfiles.
ALMA-09-022020V1R1AlmaLinux OS 9 must be configured so that all system device files are correctly labeled to prevent unauthorized modification.
ALMA-09-022130V1R1All AlmaLinux OS 9 local initialization files must have mode 0740 or less permissive.
ALMA-09-022240V1R1AlmaLinux OS 9 must have the gnutls-utils package installed.
ALMA-09-022350V1R1The kdump service on AlmaLinux OS 9 must be disabled.
ALMA-09-022460V1R1AlmaLinux OS 9 must disable the ability of a user to restart the system from the login screen.
ALMA-09-022570V1R1AlmaLinux OS 9 must prevent a user from overriding the disable-restart-buttons setting for the graphical user interface.
ALMA-09-022680V1R1AlmaLinux OS 9 must prevent special devices on file systems that are used with removable media.
ALMA-09-022790V1R1AlmaLinux OS 9 must prevent code from being executed on file systems that are used with removable media.
ALMA-09-022900V1R1AlmaLinux OS 9 must prevent files with the setuid and setgid bit set from being executed on file systems that are used with removable media.
ALMA-09-023010V1R1AlmaLinux OS 9 must disable the use of user namespaces.
ALMA-09-023120V1R1AlmaLinux OS 9 must prevent special devices on file systems that are imported via Network File System (NFS).
ALMA-09-023230V1R1AlmaLinux OS 9 must prevent code execution on file systems that are imported via Network File System (NFS).
ALMA-09-023450V1R1AlmaLinux OS 9 must prevent files with the setuid and setgid bit set from being executed on file systems that are imported via Network File System (NFS).
ALMA-09-023560V1R1AlmaLinux OS 9 must configure a DNS processing mode set be Network Manager.
ALMA-09-023670V1R1AlmaLinux OS 9 systems using Domain Name Servers (DNS) resolution must have at least two name servers configured.
ALMA-09-023780V1R1AlmaLinux OS 9 must prevent special devices on nonroot local partitions.
ALMA-09-023890V1R1The root account must be the only account having unrestricted access to an AlmaLinux OS 9 system.
ALMA-09-024000V1R1AlmaLinux OS 9 must be configured so that the cryptographic hashes of system files match vendor values.
ALMA-09-024110V1R1AlmaLinux OS 9 must clear the page allocator to prevent use-after-free attacks.
ALMA-09-024220V1R1AlmaLinux OS 9 must display the date and time of the last successful account logon upon logon.
ALMA-09-024330V1R1AlmaLinux OS 9 security patches and updates must be installed and up to date.
ALMA-09-024440V1R1AlmaLinux OS 9 policycoreutils-python-utils package must be installed.
ALMA-09-024550V1R1AlmaLinux OS 9 must enable the hardware random number generator entropy gatherer service.
ALMA-09-024660V1R1AlmaLinux OS 9 must have the rng-tools package installed.
ALMA-09-024990V1R1AlmaLinux OS 9 system accounts must not have an interactive login shell.
ALMA-09-025100V1R1AlmaLinux OS 9 must use a separate file system for /tmp.
ALMA-09-025210V1R1Local AlmaLinux OS 9 initialization files must not execute world-writable programs.
ALMA-09-025320V1R1AlmaLinux OS 9 must use a separate file system for /var/log.
ALMA-09-025430V1R1AlmaLinux OS 9 must use a separate file system for /var.
ALMA-09-025540V1R1AlmaLinux OS 9 must use a separate file system for /var/tmp.
ALMA-09-025650V1R1AlmaLinux OS 9 must disable virtual system calls.
ALMA-09-025760V1R1AlmaLinux OS 9 must use cron logging.
ALMA-09-025870V1R1AlmaLinux OS 9 must be configured so that the rsyslog daemon does not accept log messages from other servers unless the server is being used for log aggregation.
UBTU-18-010032V2R15The Ubuntu operating system must display the date and time of the last successful account logon upon logon.
UBTU-18-010150V2R15The Ubuntu Operating system must disable the x86 Ctrl-Alt-Delete key sequence if a graphical user interface is installed.
UBTU-18-010151V2R15The Ubuntu Operating system must disable the x86 Ctrl-Alt-Delete key sequence.
UBTU-18-010418V2R15The Ubuntu operating system must be configured so that remote X connections are disabled, unless to fulfill documented and validated mission requirements.
UBTU-18-010419V2R15The Ubuntu operating system SSH daemon must prevent remote hosts from connecting to the proxy display.
UBTU-18-010450V2R15All local interactive user home directories defined in the /etc/passwd file must exist.
UBTU-18-010451V2R15All local interactive user home directories must have mode 0750 or less permissive.
UBTU-18-010452V2R15All local interactive user home directories must be group-owned by the home directory owners primary group.
UBTU-18-010522V2R15The Ubuntu operating system must not have accounts configured with blank or null passwords.
UBTU-18-010523V2R15The Ubuntu operating system must not allow accounts configured with blank or null passwords.
UBTU-18-999999V2R15The Ubuntu operating system must be a vendor supported release.
UBTU-20-010048V1R9The Ubuntu operating system must be configured so that remote X connections are disabled, unless to fulfill documented and validated mission requirements.
UBTU-20-010049V1R9The Ubuntu operating system SSH daemon must prevent remote hosts from connecting to the proxy display.
UBTU-20-010453V1R9The Ubuntu operating system must display the date and time of the last successful account logon upon logon.
UBTU-20-010459V1R9The Ubuntu operating system must disable the x86 Ctrl-Alt-Delete key sequence if a graphical user interface is installed.
UBTU-20-010460V1R9The Ubuntu operating system must disable the x86 Ctrl-Alt-Delete key sequence.
UBTU-20-010462V1R9The Ubuntu operating system must not have accounts configured with blank or null passwords.
UBTU-20-010463V1R9The Ubuntu operating system must not allow accounts configured with blank or null passwords.
UBTU-24-100010V1R1Ubuntu 24.04 LTS must not have the "systemd-timesyncd" package installed.
UBTU-24-100020V1R1Ubuntu 24.04 LTS must not have the "ntp" package installed.
UBTU-24-100700V1R1Ubuntu 24.04 LTS must have the "chrony" package installed.
UBTU-24-300021V1R1Ubuntu 24.04 LTS must require users to reauthenticate for privilege escalation or when changing roles.
UBTU-24-300022V1R1Ubuntu 24.04 LTS must be configured so that remote X connections are disabled, unless to fulfill documented and validated mission requirements.
UBTU-24-300023V1R1Ubuntu 24.04 LTS SSH daemon must prevent remote hosts from connecting to the proxy display.
UBTU-24-300024V1R1Ubuntu 24.04 LTS must display the date and time of the last successful account logon upon logon.
UBTU-24-300025V1R1Ubuntu 24.04 LTS must disable the x86 Ctrl-Alt-Delete key sequence if a graphical user interface is installed.
UBTU-24-300026V1R1Ubuntu 24.04 LTS must disable the x86 Ctrl-Alt-Delete key sequence.
UBTU-24-300027V1R1Ubuntu 24.04 LTS must not have accounts configured with blank or null passwords.
UBTU-24-300028V1R1Ubuntu 24.04 LTS must not allow accounts configured in Pluggable Authentication Modules (PAM) with blank or null passwords.
UBTU-24-300029V1R1Ubuntu 24.04 LTS must generate audit records for all events that affect the systemd journal files.
WN22-00-000010V2R1Windows Server 2022 users with Administrative privileges must have separate accounts for administrative duties and normal operational tasks.
WN22-00-000030V2R1Windows Server 2022 administrative accounts must not be used with applications that access the internet, such as web browsers, or with potential internet sources, such as email.
WN22-00-000040V2R1Windows Server 2022 members of the Backup Operators group must have separate accounts for backup duties and normal operational tasks.
WN22-00-000060V2R1Windows Server 2022 manually managed application account passwords must be changed at least annually or when a system administrator with knowledge of the password leaves the organization.
WN22-00-000090V2R1Windows Server 2022 domain-joined systems must have a Trusted Platform Module (TPM) enabled and ready for use.
WN22-00-000100V2R1Windows Server 2022 must be maintained at a supported servicing level.
WN22-00-000110V2R1Windows Server 2022 must use an antivirus program.
WN22-00-000120V2R1Windows Server 2022 must have a host-based intrusion detection or prevention system.
WN22-00-000240V2R1Windows Server 2022 must have software certificate installation files removed.
WN22-00-000280V2R1Windows Server 2022 must have a host-based firewall installed and enabled.
WN22-00-000420V2R1Windows Server 2022 FTP servers must be configured to prevent anonymous logons.
WN22-00-000430V2R1Windows Server 2022 FTP servers must be configured to prevent access to the system drive.
WN22-00-000450V2R1Windows Server 2022 must have orphaned security identifiers (SIDs) removed from user rights.
WN22-00-000460V2R1Windows Server 2022 systems must have Unified Extensible Firmware Interface (UEFI) firmware and be configured to run in UEFI mode, not Legacy BIOS.
WN22-00-000470V2R1Windows Server 2022 must have Secure Boot enabled.
WN22-CC-000030V2R1Windows Server 2022 Internet Protocol version 6 (IPv6) source routing must be configured to the highest protection level to prevent IP source routing.
WN22-CC-000040V2R1Windows Server 2022 source routing must be configured to the highest protection level to prevent Internet Protocol (IP) source routing.
WN22-CC-000050V2R1Windows Server 2022 must be configured to prevent Internet Control Message Protocol (ICMP) redirects from overriding Open Shortest Path First (OSPF)-generated routes.
WN22-CC-000070V2R1Windows Server 2022 insecure logons to an SMB server must be disabled.
WN22-CC-000080V2R1Windows Server 2022 hardened Universal Naming Convention (UNC) paths must be defined to require mutual authentication and integrity for at least the \\*\SYSVOL and \\*\NETLOGON shares.
WN22-CC-000100V2R1Windows Server 2022 must be configured to enable Remote host allows delegation of nonexportable credentials.
WN22-CC-000110V2R1Windows Server 2022 virtualization-based security must be enabled with the platform security level configured to Secure Boot or Secure Boot with DMA Protection.
WN22-CC-000130V2R1Windows Server 2022 Early Launch Antimalware, Boot-Start Driver Initialization Policy must prevent boot drivers identified as bad.
WN22-CC-000140V2R1Windows Server 2022 group policy objects must be reprocessed even if they have not changed.
WN22-CC-000180V2R1Windows Server 2022 users must be prompted to authenticate when the system wakes from sleep (on battery).
WN22-CC-000190V2R1Windows Server 2022 users must be prompted to authenticate when the system wakes from sleep (plugged in).
WN22-CC-000250V2R1Windows Server 2022 Diagnostic Data must be configured to send "required diagnostic data" or "optional diagnostic data".
WN22-CC-000260V2R1Windows Server 2022 Windows Update must not obtain updates from other PCs on the internet.
WN22-CC-000320V2R1Windows Server 2022 Turning off File Explorer heap termination on corruption must be disabled.
WN22-CC-000330V2R1Windows Server 2022 File Explorer shell protocol must run in protected mode.
WN22-CC-000390V2R1Windows Server 2022 must prevent attachments from being downloaded from RSS feeds.
WN22-CC-000440V2R1Windows Server 2022 users must be notified if a web-based program attempts to install software.
WN22-DC-000150V2R1Windows Server 2022 directory data (outside the root DSE) of a nonpublic directory must be configured to prevent anonymous access.
WN22-DC-000330V2R1Windows Server 2022 domain controllers must be configured to allow reset of machine account passwords.
WN22-DC-000430V2R1The password for the krbtgt account on a domain must be reset at least every 180 days.
WN22-MS-000050V2R1Windows Server 2022 must limit the caching of logon credentials to four or less on domain-joined member servers.
WN22-MS-000140V2R1Windows Server 2022 must be running Credential Guard on domain-joined member servers.
WN22-SO-000020V2R1Windows Server 2022 must prevent local accounts with blank passwords from being used from the network.
WN22-SO-000030V2R1Windows Server 2022 built-in administrator account must be renamed.
WN22-SO-000040V2R1Windows Server 2022 built-in guest account must be renamed.
WN22-SO-000100V2R1Windows Server 2022 maximum age for machine account passwords must be configured to 30 days or less.
WN22-SO-000150V2R1Windows Server 2022 Smart Card removal option must be configured to Force Logoff or Lock Workstation.
WN22-SO-000210V2R1Windows Server 2022 must not allow anonymous SID/Name translation.
WN22-SO-000220V2R1Windows Server 2022 must not allow anonymous enumeration of Security Account Manager (SAM) accounts.
WN22-SO-000240V2R1Windows Server 2022 must be configured to prevent anonymous users from having the same permissions as the Everyone group.
WN22-SO-000260V2R1Windows Server 2022 services using Local System that use Negotiate when reverting to NTLM authentication must use the computer identity instead of authenticating anonymously.
WN22-SO-000270V2R1Windows Server 2022 must prevent NTLM from falling back to a Null session.
WN22-SO-000280V2R1Windows Server 2022 must prevent PKU2U authentication using online identities.
WN22-SO-000310V2R1Windows Server 2022 LAN Manager authentication level must be configured to send NTLMv2 response only and to refuse LM and NTLM.
WN22-SO-000320V2R1Windows Server 2022 must be configured to at least negotiate signing for LDAP client signing.
WN22-SO-000330V2R1Windows Server 2022 session security for NTLM SSP-based clients must be configured to require NTLMv2 session security and 128-bit encryption.
WN22-SO-000340V2R1Windows Server 2022 session security for NTLM SSP-based servers must be configured to require NTLMv2 session security and 128-bit encryption.
WN22-SO-000370V2R1Windows Server 2022 default permissions of global system objects must be strengthened.
WN22-UC-000010V2R1Windows Server 2022 must preserve zone information when saving attachments.
WN10-00-000005V2R8Domain-joined systems must use Windows 10 Enterprise Edition 64-bit version.
WN10-00-000010V2R8Windows 10 domain-joined systems must have a Trusted Platform Module (TPM) enabled and ready for use.
WN10-00-000015V2R8Windows 10 systems must have Unified Extensible Firmware Interface (UEFI) firmware and be configured to run in UEFI mode, not Legacy BIOS.
WN10-00-000020V2R8Secure Boot must be enabled on Windows 10 systems.
WN10-00-000040V2R8Windows 10 systems must be maintained at a supported servicing level.
WN10-00-000045V2R8The Windows 10 system must use an anti-virus program.
WN10-00-000055V2R8Alternate operating systems must not be permitted on the same system.
WN10-00-000075V2R8Only accounts responsible for the backup operations must be members of the Backup Operators group.
WN10-00-000085V2R8Standard local user accounts must not exist on a system in a domain.
WN10-00-000130V2R8Software certificate installation files must be removed from Windows 10.
WN10-00-000135V2R8A host-based firewall must be installed and enabled on the system.
WN10-00-000140V2R8Inbound exceptions to the firewall on Windows 10 domain workstations must only allow authorized remote management hosts.
WN10-00-000190V2R8Orphaned security identifiers (SIDs) must be removed from user rights on Windows 10.
WN10-00-000230V2R8The system must notify the user when a Bluetooth device attempts to connect.
WN10-00-000240V2R8Administrative accounts must not be used with applications that access the Internet, such as web browsers, or with potential Internet sources, such as email.
WN10-CC-000020V2R8IPv6 source routing must be configured to highest protection.
WN10-CC-000025V2R8The system must be configured to prevent IP source routing.
WN10-CC-000030V2R8The system must be configured to prevent Internet Control Message Protocol (ICMP) redirects from overriding Open Shortest Path First (OSPF) generated routes.
WN10-CC-000040V2R8Insecure logons to an SMB server must be disabled.
WN10-CC-000055V2R8Simultaneous connections to the internet or a Windows domain must be limited.
WN10-CC-000060V2R8Connections to non-domain networks when connected to a domain authenticated network must be blocked.
WN10-CC-000065V2R8Wi-Fi Sense must be disabled.
WN10-CC-000068V2R8Windows 10 must be configured to enable Remote host allows delegation of non-exportable credentials.
WN10-CC-000070V2R8Virtualization Based Security must be enabled on Windows 10 with the platform security level configured to Secure Boot or Secure Boot with DMA Protection.
WN10-CC-000075V2R8Credential Guard must be running on Windows 10 domain-joined systems.
WN10-CC-000085V2R8Early Launch Antimalware, Boot-Start Driver Initialization Policy must prevent boot drivers.
WN10-CC-000090V2R8Group Policy objects must be reprocessed even if they have not changed.
WN10-CC-000115V2R8Systems must at least attempt device authentication using certificates.
WN10-CC-000170V2R8The setting to allow Microsoft accounts to be optional for modern style apps must be enabled.
WN10-CC-000195V2R8Enhanced anti-spoofing for facial recognition must be enabled on Window 10.
WN10-CC-000204V2R8If Enhanced diagnostic data is enabled it must be limited to the minimum required to support Windows Analytics.
WN10-CC-000205V2R8Windows Telemetry must not be configured to Full.
WN10-CC-000206V2R8Windows Update must not obtain updates from other PCs on the internet.
WN10-CC-000225V2R8File Explorer shell protocol must run in protected mode.
WN10-CC-000230V2R8Users must not be allowed to ignore Windows Defender SmartScreen filter warnings for malicious websites in Microsoft Edge.
WN10-CC-000235V2R8Users must not be allowed to ignore Windows Defender SmartScreen filter warnings for unverified files in Microsoft Edge.
WN10-CC-000238V2R8Windows 10 must be configured to prevent certificate error overrides in Microsoft Edge.
WN10-CC-000245V2R8The password manager function in the Edge browser must be disabled.
WN10-CC-000250V2R8The Windows Defender SmartScreen filter for Microsoft Edge must be enabled.
WN10-CC-000255V2R8The use of a hardware security device with Windows Hello for Business must be enabled.
WN10-CC-000260V2R8Windows 10 must be configured to require a minimum pin length of six characters or greater.
WN10-CC-000295V2R8Attachments must be prevented from being downloaded from RSS feeds.
WN10-CC-000320V2R8Users must be notified if a web-based program attempts to install software.
WN10-SO-000015V2R8Local accounts with blank passwords must be restricted to prevent access from the network.
WN10-SO-000020V2R8The built-in administrator account must be renamed.
WN10-SO-000025V2R8The built-in guest account must be renamed.
WN10-SO-000050V2R8The computer account password must not be prevented from being reset.
WN10-SO-000055V2R8The maximum age for machine account passwords must be configured to 30 days or less.
WN10-SO-000085V2R8Caching of logon credentials must be limited.
WN10-SO-000095V2R8The Smart Card removal option must be configured to Force Logoff or Lock Workstation.
WN10-SO-000140V2R8Anonymous SID/Name translation must not be allowed.
WN10-SO-000145V2R8Anonymous enumeration of SAM accounts must not be allowed.
WN10-SO-000160V2R8The system must be configured to prevent anonymous users from having the same rights as the Everyone group.
WN10-SO-000180V2R8NTLM must be prevented from falling back to a Null session.
WN10-SO-000185V2R8PKU2U authentication using online identities must be prevented.
WN10-SO-000205V2R8The LanMan authentication level must be set to send NTLMv2 response only, and to refuse LM and NTLM.
WN10-SO-000210V2R8The system must be configured to the required LDAP client signing level.
WN10-SO-000215V2R8The system must be configured to meet the minimum session security requirement for NTLM SSP based clients.
WN10-SO-000220V2R8The system must be configured to meet the minimum session security requirement for NTLM SSP based servers.
WN10-SO-000240V2R8The default permissions of global system objects must be increased.
WN10-UC-000020V2R8Zone information must be preserved when saving attachments.
WN10-CC-000050V2R8Hardened UNC paths must be defined to require mutual authentication and integrity for at least the \\*\SYSVOL and \\*\NETLOGON shares.
WN10-CC-000080V2R8Virtualization-based protection of code integrity must be enabled.
WN10-00-000395V2R8Windows 10 must not have portproxy enabled or in use.
APPL-15-003013V1R1The macOS system must enable firmware password.
APPL-15-005110V1R1The macOS system must enforce enrollment in Mobile Device Management (MDM).
APPL-15-005120V1R1The macOS system must enable Recovery Lock.
APPL-15-005130V1R1The macOS system must enforce installation of XProtect Remediator and Gatekeeper updates automatically.
APPL-14-000016V2R1The macOS system must be integrated into a directory services infrastructure.
APPL-14-003013V2R1The macOS system must enable firmware password.
APPL-14-005110V2R1The macOS system must enforce enrollment in mobile device management.
APPL-14-005120V2R1The macOS system must enable recovery lock.
APPL-14-005130V2R1The macOS system must enforce installation of XProtect Remediator and Gatekeeper updates automatically.
WN11-00-000005V2R1Domain-joined systems must use Windows 11 Enterprise Edition 64-bit version.
WN11-00-000040V2R1Windows 11 systems must be maintained at a supported servicing level.
WN11-00-000045V2R1The Windows 11 system must use an antivirus program.
WN11-00-000055V2R1Alternate operating systems must not be permitted on the same system.
WN11-00-000075V2R1Only accounts responsible for the backup operations must be members of the Backup Operators group.
WN11-00-000085V2R1Standard local user accounts must not exist on a system in a domain.
WN11-00-000130V2R1Software certificate installation files must be removed from Windows 11.
WN11-00-000135V2R1A host-based firewall must be installed and enabled on the system.
WN11-00-000190V2R1Orphaned security identifiers (SIDs) must be removed from user rights on Windows 11.
WN11-00-000230V2R1The system must notify the user when a Bluetooth device attempts to connect.
WN11-00-000240V2R1Administrative accounts must not be used with applications that access the internet, such as web browsers, or with potential internet sources, such as email.
WN11-CC-000020V2R1IPv6 source routing must be configured to highest protection.
WN11-CC-000025V2R1The system must be configured to prevent IP source routing.
WN11-CC-000030V2R1The system must be configured to prevent Internet Control Message Protocol (ICMP) redirects from overriding Open Shortest Path First (OSPF) generated routes.
WN11-CC-000040V2R1Insecure logons to an SMB server must be disabled.
WN11-CC-000050V2R1Hardened UNC Paths must be defined to require mutual authentication and integrity for at least the \\*\SYSVOL and \\*\NETLOGON shares.
WN11-CC-000060V2R1Connections to non-domain networks when connected to a domain authenticated network must be blocked.
WN11-CC-000065V2R1Wi-Fi Sense must be disabled.
WN11-CC-000068V2R1Windows 11 must be configured to enable Remote host allows delegation of non-exportable credentials.
WN11-CC-000070V2R1Virtualization-based Security must be enabled on Windows 11 with the platform security level configured to Secure Boot or Secure Boot with DMA Protection.
WN11-CC-000075V2R1Credential Guard must be running on Windows 11 domain-joined systems.
WN11-CC-000080V2R1Virtualization-based protection of code integrity must be enabled.
WN11-CC-000085V2R1Early Launch Antimalware, Boot-Start Driver Initialization Policy must prevent boot drivers.
WN11-CC-000090V2R1Group Policy objects must be reprocessed even if they have not changed.
WN11-CC-000115V2R1Systems must at least attempt device authentication using certificates.
WN11-CC-000170V2R1The setting to allow Microsoft accounts to be optional for modern style apps must be enabled.
WN11-CC-000195V2R1Enhanced anti-spoofing for facial recognition must be enabled on Windows 11.
WN11-CC-000204V2R1Enhanced diagnostic data must be limited to the minimum required to support Windows Analytics.
WN11-CC-000206V2R1Windows Update must not obtain updates from other PCs on the internet.
WN11-CC-000225V2R1File Explorer shell protocol must run in protected mode.
WN11-CC-000255V2R1The use of a hardware security device with Windows Hello for Business must be enabled.
WN11-CC-000260V2R1Windows 11 must be configured to require a minimum pin length of six characters or greater.
WN11-CC-000295V2R1Attachments must be prevented from being downloaded from RSS feeds.
WN11-CC-000320V2R1Users must be notified if a web-based program attempts to install software.
WN11-SO-000015V2R1Local accounts with blank passwords must be restricted to prevent access from the network.
WN11-SO-000020V2R1The built-in administrator account must be renamed.
WN11-SO-000025V2R1The built-in guest account must be renamed.
WN11-SO-000050V2R1The computer account password must not be prevented from being reset.
WN11-SO-000055V2R1The maximum age for machine account passwords must be configured to 30 days or less.
WN11-SO-000085V2R1Caching of logon credentials must be limited.
WN11-SO-000095V2R1The Smart Card removal option must be configured to Force Logoff or Lock Workstation.
WN11-SO-000140V2R1Anonymous SID/Name translation must not be allowed.
WN11-SO-000145V2R1Anonymous enumeration of SAM accounts must not be allowed.
WN11-SO-000160V2R1The system must be configured to prevent anonymous users from having the same rights as the Everyone group.
WN11-SO-000180V2R1NTLM must be prevented from falling back to a Null session.
WN11-SO-000185V2R1PKU2U authentication using online identities must be prevented.
WN11-SO-000205V2R1The LanMan authentication level must be set to send NTLMv2 response only, and to refuse LM and NTLM.
WN11-SO-000210V2R1The system must be configured to the required LDAP client signing level.
WN11-SO-000215V2R1The system must be configured to meet the minimum session security requirement for NTLM SSP based clients.
WN11-SO-000220V2R1The system must be configured to meet the minimum session security requirement for NTLM SSP based servers.
WN11-SO-000240V2R1The default permissions of global system objects must be increased.
WN11-UC-000020V2R1Zone information must be preserved when saving attachments.
WN11-00-000395V2R1Windows 11 must not have portproxy enabled or in use.
UBTU-22-211015V2R1Ubuntu 22.04 LTS must disable the x86 Ctrl-Alt-Delete key sequence.
UBTU-22-215015V2R1Ubuntu 22.04 LTS must have the "chrony" package installed.
UBTU-22-215020V2R1Ubuntu 22.04 LTS must not have the "systemd-timesyncd" package installed.
UBTU-22-215025V2R1Ubuntu 22.04 LTS must not have the "ntp" package installed.
UBTU-22-255040V2R1Ubuntu 22.04 LTS must be configured so that remote X connections are disabled, unless to fulfill documented and validated mission requirements.
UBTU-22-255045V2R1Ubuntu 22.04 LTS SSH daemon must prevent remote hosts from connecting to the proxy display.
UBTU-22-271030V2R1Ubuntu 22.04 LTS must disable the x86 Ctrl-Alt-Delete key sequence if a graphical user interface is installed.
UBTU-22-412015V2R1Ubuntu 22.04 LTS must display the date and time of the last successful account logon upon logon.
UBTU-22-611060V2R1Ubuntu 22.04 LTS must not allow accounts configured with blank or null passwords.
UBTU-22-611065V2R1Ubuntu 22.04 LTS must not have accounts configured with blank or null passwords.
UBTU-22-654190V2R1Ubuntu 22.04 LTS must generate audit records for all events that affect the systemd journal files.
RHEL-08-010000V1R9RHEL 8 must be a vendor-supported release.
RHEL-08-010010V1R9RHEL 8 vendor packaged system security patches and updates must be installed and up to date.
RHEL-08-010292V1R9RHEL 8 must ensure the SSH server uses strong entropy.
RHEL-08-010460V1R9There must be no shosts.equiv files on the RHEL 8 operating system.
RHEL-08-010470V1R9There must be no .shosts files on the RHEL 8 operating system.
RHEL-08-010471V1R9RHEL 8 must enable the hardware random number generator entropy gatherer service.
RHEL-08-010480V1R9The RHEL 8 SSH public host key files must have mode 0644 or less permissive.
RHEL-08-010490V1R9The RHEL 8 SSH private host key files must have mode 0640 or less permissive.
RHEL-08-010500V1R9The RHEL 8 SSH daemon must perform strict mode checking of home directory configuration files.
RHEL-08-010520V1R9The RHEL 8 SSH daemon must not allow authentication using known host’s authentication.
RHEL-08-010521V1R9The RHEL 8 SSH daemon must not allow Kerberos authentication, except to fulfill documented and validated mission requirements.
RHEL-08-010540V1R9RHEL 8 must use a separate file system for /var.
RHEL-08-010541V1R9RHEL 8 must use a separate file system for /var/log.
RHEL-08-010542V1R9RHEL 8 must use a separate file system for the system audit data path.
RHEL-08-010543V1R9A separate RHEL 8 filesystem must be used for the /tmp directory.
RHEL-08-010561V1R9The rsyslog service must be running in RHEL 8.
RHEL-08-010570V1R9RHEL 8 must prevent files with the setuid and setgid bit set from being executed on file systems that contain user home directories.
RHEL-08-010571V1R9RHEL 8 must prevent files with the setuid and setgid bit set from being executed on the /boot directory.
RHEL-08-010580V1R9RHEL 8 must prevent special devices on non-root local partitions.
RHEL-08-010590V1R9RHEL 8 must prevent code from being executed on file systems that contain user home directories.
RHEL-08-010600V1R9RHEL 8 must prevent special devices on file systems that are used with removable media.
RHEL-08-010610V1R9RHEL 8 must prevent code from being executed on file systems that are used with removable media.
RHEL-08-010620V1R9RHEL 8 must prevent files with the setuid and setgid bit set from being executed on file systems that are used with removable media.
RHEL-08-010630V1R9RHEL 8 must prevent code from being executed on file systems that are imported via Network File System (NFS).
RHEL-08-010640V1R9RHEL 8 must prevent special devices on file systems that are imported via Network File System (NFS).
RHEL-08-010650V1R9RHEL 8 must prevent files with the setuid and setgid bit set from being executed on file systems that are imported via Network File System (NFS).
RHEL-08-010660V1R9Local RHEL 8 initialization files must not execute world-writable programs.
RHEL-08-010670V1R9RHEL 8 must disable kernel dumps unless needed.
RHEL-08-010671V1R9RHEL 8 must disable the kernel.core_pattern.
RHEL-08-010672V1R9RHEL 8 must disable acquiring, saving, and processing core dumps.
RHEL-08-010673V1R9RHEL 8 must disable core dumps for all users.
RHEL-08-010674V1R9RHEL 8 must disable storing core dumps.
RHEL-08-010675V1R9RHEL 8 must disable core dump backtraces.
RHEL-08-010680V1R9For RHEL 8 systems using Domain Name Servers (DNS) resolution, at least two name servers must be configured.
RHEL-08-010690V1R9Executable search paths within the initialization files of all local interactive RHEL 8 users must only contain paths that resolve to the system default or the users home directory.
RHEL-08-010700V1R9All RHEL 8 world-writable directories must be owned by root, sys, bin, or an application user.
RHEL-08-010710V1R9All RHEL 8 world-writable directories must be group-owned by root, sys, bin, or an application group.
RHEL-08-010720V1R9All RHEL 8 local interactive users must have a home directory assigned in the /etc/passwd file.
RHEL-08-010730V1R9All RHEL 8 local interactive user home directories must have mode 0750 or less permissive.
RHEL-08-010740V1R9All RHEL 8 local interactive user home directories must be group-owned by the home directory owner’s primary group.
RHEL-08-010750V1R9All RHEL 8 local interactive user home directories defined in the /etc/passwd file must exist.
RHEL-08-010760V1R9All RHEL 8 local interactive user accounts must be assigned a home directory upon creation.
RHEL-08-010770V1R9All RHEL 8 local initialization files must have mode 0740 or less permissive.
RHEL-08-010780V1R9All RHEL 8 local files and directories must have a valid owner.
RHEL-08-010790V1R9All RHEL 8 local files and directories must have a valid group owner.
RHEL-08-010800V1R9A separate RHEL 8 filesystem must be used for user home directories (such as /home or an equivalent).
RHEL-08-020320V1R9RHEL 8 must not have unnecessary accounts.
RHEL-08-020330V1R9RHEL 8 must not allow accounts configured with blank or null passwords.
RHEL-08-020340V1R9RHEL 8 must display the date and time of the last successful account logon upon logon.
RHEL-08-020350V1R9RHEL 8 must display the date and time of the last successful account logon upon an SSH logon.
RHEL-08-020353V1R9RHEL 8 must define default permissions for logon and non-logon shells.
RHEL-08-030010V1R9Cron logging must be implemented in RHEL 8.
RHEL-08-030061V1R9The RHEL 8 audit system must audit local events.
RHEL-08-030063V1R9RHEL 8 must resolve audit information before writing to disk.
RHEL-08-030670V1R9RHEL 8 must have the packages required for offloading audit logs installed.
RHEL-08-030680V1R9RHEL 8 must have the packages required for encrypting offloaded audit logs installed.
RHEL-08-040170V1R9The x86 Ctrl-Alt-Delete key sequence must be disabled on RHEL 8.
RHEL-08-040171V1R9The x86 Ctrl-Alt-Delete key sequence in RHEL 8 must be disabled if a graphical user interface is installed.
RHEL-08-040172V1R9The systemd Ctrl-Alt-Delete burst key sequence in RHEL 8 must be disabled.
RHEL-08-040180V1R9The debug-shell systemd service must be disabled on RHEL 8.
RHEL-08-040190V1R9The Trivial File Transfer Protocol (TFTP) server package must not be installed if not required for RHEL 8 operational support.
RHEL-08-040200V1R9The root account must be the only account having unrestricted access to the RHEL 8 system.
RHEL-08-040210V1R9RHEL 8 must prevent IPv6 Internet Control Message Protocol (ICMP) redirect messages from being accepted.
RHEL-08-040220V1R9RHEL 8 must not send Internet Control Message Protocol (ICMP) redirects.
RHEL-08-040230V1R9RHEL 8 must not respond to Internet Control Message Protocol (ICMP) echoes sent to a broadcast address.
RHEL-08-040240V1R9RHEL 8 must not forward IPv6 source-routed packets.
RHEL-08-040250V1R9RHEL 8 must not forward IPv6 source-routed packets by default.
RHEL-08-040260V1R9RHEL 8 must not enable IPv6 packet forwarding unless the system is a router.
RHEL-08-040261V1R9RHEL 8 must not accept router advertisements on all IPv6 interfaces.
RHEL-08-040262V1R9RHEL 8 must not accept router advertisements on all IPv6 interfaces by default.
RHEL-08-040270V1R9RHEL 8 must not allow interfaces to perform Internet Control Message Protocol (ICMP) redirects by default.
RHEL-08-040280V1R9RHEL 8 must ignore IPv6 Internet Control Message Protocol (ICMP) redirect messages.
RHEL-08-040281V1R9RHEL 8 must disable access to network bpf syscall from unprivileged processes.
RHEL-08-040282V1R9RHEL 8 must restrict usage of ptrace to descendant processes.
RHEL-08-040283V1R9RHEL 8 must restrict exposed kernel pointer addresses access.
RHEL-08-040284V1R9RHEL 8 must disable the use of user namespaces.
RHEL-08-040285V1R9RHEL 8 must use reverse path filtering on all IPv4 interfaces.
RHEL-08-040290V1R9RHEL 8 must be configured to prevent unrestricted mail relaying.
RHEL-08-040300V1R9The RHEL 8 file integrity tool must be configured to verify extended attributes.
RHEL-08-040310V1R9The RHEL 8 file integrity tool must be configured to verify Access Control Lists (ACLs).
RHEL-08-040320V1R9The graphical display manager must not be installed on RHEL 8 unless approved.
RHEL-08-040330V1R9RHEL 8 network interfaces must not be in promiscuous mode.
RHEL-08-040340V1R9RHEL 8 remote X connections for interactive users must be disabled unless to fulfill documented and validated mission requirements.
RHEL-08-040341V1R9The RHEL 8 SSH daemon must prevent remote hosts from connecting to the proxy display.
RHEL-08-040350V1R9If the Trivial File Transfer Protocol (TFTP) server is required, the RHEL 8 TFTP daemon must be configured to operate in secure mode.
RHEL-08-040360V1R9A File Transfer Protocol (FTP) server package must not be installed unless mission essential on RHEL 8.
RHEL-08-040370V1R9The gssproxy package must not be installed unless mission essential on RHEL 8.
RHEL-08-040380V1R9The iprutils package must not be installed unless mission essential on RHEL 8.
RHEL-08-040390V1R9The tuned package must not be installed unless mission essential on RHEL 8.
RHEL-08-010382V1R9RHEL 8 must restrict privilege elevation to authorized personnel.
RHEL-08-010383V1R9RHEL 8 must use the invoking user's password for privilege escalation when using "sudo".
RHEL-08-010472V1R9RHEL 8 must have the packages required to use the hardware random number generator entropy gatherer service.
RHEL-08-010522V1R9The RHEL 8 SSH daemon must not allow GSSAPI authentication, except to fulfill documented and validated mission requirements.
RHEL-08-010544V1R9RHEL 8 must use a separate file system for /var/tmp.
RHEL-08-010572V1R9RHEL 8 must prevent files with the setuid and setgid bit set from being executed on the /boot/efi directory.
RHEL-08-010731V1R9All RHEL 8 local interactive user home directory files must have mode 0750 or less permissive.
RHEL-08-010741V1R9RHEL 8 must be configured so that all files and directories contained in local interactive user home directories are group-owned by a group of which the home directory owner is a member.
RHEL-08-020032V1R9RHEL 8 must disable the user list at logon for graphical user interfaces.
RHEL-08-020331V1R9RHEL 8 must not allow blank or null passwords in the system-auth file.
RHEL-08-020332V1R9RHEL 8 must not allow blank or null passwords in the password-auth file.
RHEL-08-040209V1R9RHEL 8 must prevent IPv4 Internet Control Message Protocol (ICMP) redirect messages from being accepted.
RHEL-08-040239V1R9RHEL 8 must not forward IPv4 source-routed packets.
RHEL-08-040249V1R9RHEL 8 must not forward IPv4 source-routed packets by default.
RHEL-08-040279V1R9RHEL 8 must ignore IPv4 Internet Control Message Protocol (ICMP) redirect messages.
RHEL-08-040286V1R9RHEL 8 must enable hardening for the Berkeley Packet Filter Just-in-time compiler.
RHEL-08-040259V1R9RHEL 8 must not enable IPv4 packet forwarding unless the system is a router.
RHEL-08-010121V1R9The RHEL 8 operating system must not have accounts configured with blank or null passwords.
RHEL-08-010379V1R9RHEL 8 must specify the default "include" directory for the /etc/sudoers file.
RHEL-08-020101V1R9RHEL 8 must ensure the password complexity module is enabled in the system-auth file.
RHEL-08-020102V1R9RHEL 8 systems below version 8.4 must ensure the password complexity module in the system-auth file is configured for three retries or less.
RHEL-08-020103V1R9RHEL 8 systems below version 8.4 must ensure the password complexity module in the password-auth file is configured for three retries or less.
RHEL-08-020104V1R9RHEL 8 systems, version 8.4 and above, must ensure the password complexity module is configured for three retries or less.
RHEL-08-040321V1R9The graphical display manager must not be the default target on RHEL 8 unless approved.
RHEL-07-010290V3R8The Red Hat Enterprise Linux operating system must not allow accounts configured with blank or null passwords.
RHEL-07-020230V3R8The Red Hat Enterprise Linux operating system must be configured so that the x86 Ctrl-Alt-Delete key sequence is disabled on the command line.
RHEL-07-020231V3R8The Red Hat Enterprise Linux operating system must be configured so that the x86 Ctrl-Alt-Delete key sequence is disabled in the Graphical User Interface.
RHEL-07-020250V3R8The Red Hat Enterprise Linux operating system must be a vendor supported release.
RHEL-07-020260V3R8The Red Hat Enterprise Linux operating system security patches and updates must be installed and up to date.
RHEL-07-020270V3R8The Red Hat Enterprise Linux operating system must not have unnecessary accounts.
RHEL-07-020310V3R8The Red Hat Enterprise Linux operating system must be configured so that the root account must be the only account having unrestricted access to the system.
RHEL-07-020320V3R8The Red Hat Enterprise Linux operating system must be configured so that all files and directories have a valid owner.
RHEL-07-020330V3R8The Red Hat Enterprise Linux operating system must be configured so that all files and directories have a valid group owner.
RHEL-07-020610V3R8The Red Hat Enterprise Linux operating system must be configured so that all local interactive user accounts, upon creation, are assigned a home directory.
RHEL-07-020620V3R8The Red Hat Enterprise Linux operating system must be configured so that all local interactive users have a home directory assigned and defined in the /etc/passwd file.
RHEL-07-020630V3R8The Red Hat Enterprise Linux operating system must be configured so that all local interactive user home directories have mode 0750 or less permissive.
RHEL-07-020640V3R8The Red Hat Enterprise Linux operating system must be configured so that all local interactive user home directories are owned by their respective users.
RHEL-07-020650V3R8The Red Hat Enterprise Linux operating system must be configured so that all local interactive user home directories are group-owned by the home directory owners primary group.
RHEL-07-020660V3R8The Red Hat Enterprise Linux operating system must be configured so that all files and directories contained in local interactive user home directories have a valid owner.
RHEL-07-020670V3R8The Red Hat Enterprise Linux operating system must be configured so that all files and directories contained in local interactive user home directories are group-owned by a group of which the home directory owner is a member.
RHEL-07-020680V3R8The Red Hat Enterprise Linux operating system must be configured so that all files and directories contained in local interactive user home directories have a mode of 0750 or less permissive.
RHEL-07-020690V3R8The Red Hat Enterprise Linux operating system must be configured so that all local initialization files for interactive users are owned by the home directory user or root.
RHEL-07-020700V3R8The Red Hat Enterprise Linux operating system must be configured so that all local initialization files for local interactive users are be group-owned by the users primary group or root.
RHEL-07-020710V3R8The Red Hat Enterprise Linux operating system must be configured so that all local initialization files have mode 0740 or less permissive.
RHEL-07-020720V3R8The Red Hat Enterprise Linux operating system must be configured so that all local interactive user initialization files executable search paths contain only paths that resolve to the users home directory.
RHEL-07-020730V3R8The Red Hat Enterprise Linux operating system must be configured so that local initialization files do not execute world-writable programs.
RHEL-07-020900V3R8The Red Hat Enterprise Linux operating system must be configured so that all system device files are correctly labeled to prevent unauthorized modification.
RHEL-07-021000V3R8The Red Hat Enterprise Linux operating system must be configured so that file systems containing user home directories are mounted to prevent files with the setuid and setgid bit set from being executed.
RHEL-07-021010V3R8The Red Hat Enterprise Linux operating system must prevent files with the setuid and setgid bit set from being executed on file systems that are used with removable media.
RHEL-07-021020V3R8The Red Hat Enterprise Linux operating system must prevent files with the setuid and setgid bit set from being executed on file systems that are being imported via Network File System (NFS).
RHEL-07-021021V3R8The Red Hat Enterprise Linux operating system must prevent binary files from being executed on file systems that are being imported via Network File System (NFS).
RHEL-07-021030V3R8The Red Hat Enterprise Linux operating system must be configured so that all world-writable directories are group-owned by root, sys, bin, or an application group.
RHEL-07-021040V3R8The Red Hat Enterprise Linux operating system must set the umask value to 077 for all local interactive user accounts.
RHEL-07-021100V3R8The Red Hat Enterprise Linux operating system must have cron logging implemented.
RHEL-07-021110V3R8The Red Hat Enterprise Linux operating system must be configured so that the cron.allow file, if it exists, is owned by root.
RHEL-07-021120V3R8The Red Hat Enterprise Linux operating system must be configured so that the cron.allow file, if it exists, is group-owned by root.
RHEL-07-021300V3R8The Red Hat Enterprise Linux operating system must disable Kernel core dumps unless needed.
RHEL-07-021310V3R8The Red Hat Enterprise Linux operating system must be configured so that a separate file system is used for user home directories (such as /home or an equivalent).
RHEL-07-021320V3R8The Red Hat Enterprise Linux operating system must use a separate file system for /var.
RHEL-07-021330V3R8The Red Hat Enterprise Linux operating system must use a separate file system for the system audit data path.
RHEL-07-021340V3R8The Red Hat Enterprise Linux operating system must use a separate file system for /tmp (or equivalent).
RHEL-07-021600V3R8The Red Hat Enterprise Linux operating system must be configured so that the file integrity tool is configured to verify Access Control Lists (ACLs).
RHEL-07-021610V3R8The Red Hat Enterprise Linux operating system must be configured so that the file integrity tool is configured to verify extended attributes.
RHEL-07-021620V3R8The Red Hat Enterprise Linux operating system must use a file integrity tool that is configured to use FIPS 140-2 approved cryptographic hashes for validating file contents and directories.
RHEL-07-031000V3R8The Red Hat Enterprise Linux operating system must send rsyslog output to a log aggregation server.
RHEL-07-031010V3R8The Red Hat Enterprise Linux operating system must be configured so that the rsyslog daemon does not accept log messages from other servers unless the server is being used for log aggregation.
RHEL-07-040201V3R8The Red Hat Enterprise Linux operating system must implement virtual address space randomization.
RHEL-07-040330V3R8The Red Hat Enterprise Linux operating system must be configured so that the SSH daemon does not allow authentication using RSA rhosts authentication.
RHEL-07-040350V3R8The Red Hat Enterprise Linux operating system must be configured so that the SSH daemon does not allow authentication using rhosts authentication.
RHEL-07-040360V3R8The Red Hat Enterprise Linux operating system must display the date and time of the last successful account logon upon an SSH logon.
RHEL-07-040370V3R8The Red Hat Enterprise Linux operating system must not permit direct logons to the root account using remote access via SSH.
RHEL-07-040380V3R8The Red Hat Enterprise Linux operating system must be configured so that the SSH daemon does not allow authentication using known hosts authentication.
RHEL-07-040410V3R8The Red Hat Enterprise Linux operating system must be configured so that the SSH public host key files have mode 0644 or less permissive.
RHEL-07-040420V3R8The Red Hat Enterprise Linux operating system must be configured so that the SSH private host key files have mode 0600 or less permissive.
RHEL-07-040450V3R8The Red Hat Enterprise Linux operating system must be configured so that the SSH daemon performs strict mode checking of home directory configuration files.
RHEL-07-040460V3R8The Red Hat Enterprise Linux operating system must be configured so that the SSH daemon uses privilege separation.
RHEL-07-040470V3R8The Red Hat Enterprise Linux operating system must be configured so that the SSH daemon does not allow compression or only allows compression after successful authentication.
RHEL-07-040520V3R8The Red Hat Enterprise Linux operating system must enable an application firewall, if available.
RHEL-07-040530V3R8The Red Hat Enterprise Linux operating system must display the date and time of the last successful account logon upon logon.
RHEL-07-040540V3R8The Red Hat Enterprise Linux operating system must not contain .shosts files.
RHEL-07-040550V3R8The Red Hat Enterprise Linux operating system must not contain shosts.equiv files.
RHEL-07-040600V3R8For Red Hat Enterprise Linux operating systems using DNS resolution, at least two name servers must be configured.
RHEL-07-040610V3R8The Red Hat Enterprise Linux operating system must not forward Internet Protocol version 4 (IPv4) source-routed packets.
RHEL-07-040611V3R8The Red Hat Enterprise Linux operating system must use a reverse-path filter for IPv4 network traffic when possible on all interfaces.
RHEL-07-040612V3R8The Red Hat Enterprise Linux operating system must use a reverse-path filter for IPv4 network traffic when possible by default.
RHEL-07-040620V3R8The Red Hat Enterprise Linux operating system must not forward Internet Protocol version 4 (IPv4) source-routed packets by default.
RHEL-07-040630V3R8The Red Hat Enterprise Linux operating system must not respond to Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) echoes sent to a broadcast address.
RHEL-07-040640V3R8The Red Hat Enterprise Linux operating system must prevent Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirect messages from being accepted.
RHEL-07-040641V3R8The Red Hat Enterprise Linux operating system must ignore Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirect messages.
RHEL-07-040650V3R8The Red Hat Enterprise Linux operating system must not allow interfaces to perform Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirects by default.
RHEL-07-040660V3R8The Red Hat Enterprise Linux operating system must not send Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirects.
RHEL-07-040670V3R8Network interfaces configured on the Red Hat Enterprise Linux operating system must not be in promiscuous mode.
RHEL-07-040680V3R8The Red Hat Enterprise Linux operating system must be configured to prevent unrestricted mail relaying.
RHEL-07-040690V3R8The Red Hat Enterprise Linux operating system must not have a File Transfer Protocol (FTP) server package installed unless needed.
RHEL-07-040700V3R8The Red Hat Enterprise Linux operating system must not have the Trivial File Transfer Protocol (TFTP) server package installed if not required for operational support.
RHEL-07-040710V3R8The Red Hat Enterprise Linux operating system must be configured so that remote X connections are disabled except to fulfill documented and validated mission requirements.
RHEL-07-040720V3R8The Red Hat Enterprise Linux operating system must be configured so that if the Trivial File Transfer Protocol (TFTP) server is required, the TFTP daemon is configured to operate in secure mode.
RHEL-07-040730V3R8The Red Hat Enterprise Linux operating system must not have a graphical display manager installed unless approved.
RHEL-07-040740V3R8The Red Hat Enterprise Linux operating system must not be performing packet forwarding unless the system is a router.
RHEL-07-040750V3R8The Red Hat Enterprise Linux operating system must be configured so that the Network File System (NFS) is configured to use RPCSEC_GSS.
RHEL-07-040800V3R8SNMP community strings on the Red Hat Enterprise Linux operating system must be changed from the default.
RHEL-07-040810V3R8The Red Hat Enterprise Linux operating system access control program must be configured to grant or deny system access to specific hosts and services.
RHEL-07-040820V3R8The Red Hat Enterprise Linux operating system must not have unauthorized IP tunnels configured.
RHEL-07-040830V3R8The Red Hat Enterprise Linux operating system must not forward IPv6 source-routed packets.
RHEL-07-010020V3R8The Red Hat Enterprise Linux operating system must be configured so that the cryptographic hash of system files and commands matches vendor values.
RHEL-07-020019V3R8The Red Hat Enterprise Linux operating system must implement the Endpoint Security for Linux Threat Prevention tool.
RHEL-07-032000V3R8The Red Hat Enterprise Linux operating system must use a virus scan program.
RHEL-07-021031V3R8The Red Hat Enterprise Linux operating system must be configured so that all world-writable directories are owned by root, sys, bin, or an application user.
RHEL-07-040711V3R8The Red Hat Enterprise Linux operating system SSH daemon must prevent remote hosts from connecting to the proxy display.
RHEL-07-010341V3R8The Red Hat Enterprise Linux operating system must restrict privilege elevation to authorized personnel.
RHEL-07-010342V3R8The Red Hat Enterprise Linux operating system must use the invoking user's password for privilege escalation when using "sudo".
RHEL-07-010291V3R8The Red Hat Enterprise Linux operating system must not have accounts configured with blank or null passwords.
RHEL-07-010339V3R8The Red Hat Enterprise Linux operating system must specify the default "include" directory for the /etc/sudoers file.
RHEL-09-211010V2R1RHEL 9 must be a vendor-supported release.
RHEL-09-211015V2R1RHEL 9 vendor packaged system security patches and updates must be installed and up to date.
RHEL-09-211030V2R1The graphical display manager must not be the default target on RHEL 9 unless approved.
RHEL-09-211035V2R1RHEL 9 must enable the hardware random number generator entropy gatherer service.
RHEL-09-212015V2R1RHEL 9 must disable the ability of systemd to spawn an interactive boot process.
RHEL-09-212025V2R1RHEL 9 /boot/grub2/grub.cfg file must be group-owned by root.
RHEL-09-212030V2R1RHEL 9 /boot/grub2/grub.cfg file must be owned by root.
RHEL-09-212035V2R1RHEL 9 must disable virtual system calls.
RHEL-09-212040V2R1RHEL 9 must clear the page allocator to prevent use-after-free attacks.
RHEL-09-213020V2R1RHEL 9 must prevent the loading of a new kernel for later execution.
RHEL-09-213040V2R1RHEL 9 must disable the kernel.core_pattern.
RHEL-09-213085V2R1RHEL 9 must disable core dump backtraces.
RHEL-09-213090V2R1RHEL 9 must disable storing core dumps.
RHEL-09-213095V2R1RHEL 9 must disable core dumps for all users.
RHEL-09-213100V2R1RHEL 9 must disable acquiring, saving, and processing core dumps.
RHEL-09-213105V2R1RHEL 9 must disable the use of user namespaces.
RHEL-09-213115V2R1The kdump service on RHEL 9 must be disabled.
RHEL-09-214030V2R1RHEL 9 must be configured so that the cryptographic hashes of system files match vendor values.
RHEL-09-215020V2R1RHEL 9 must not have the sendmail package installed.
RHEL-09-215060V2R1RHEL 9 must not have a Trivial File Transfer Protocol (TFTP) server package installed.
RHEL-09-215065V2R1RHEL 9 must not have the quagga package installed.
RHEL-09-215070V2R1A graphical display manager must not be installed on RHEL 9 unless approved.
RHEL-09-215080V2R1RHEL 9 must have the gnutls-utils package installed.
RHEL-09-215085V2R1RHEL 9 must have the nss-tools package installed.
RHEL-09-215090V2R1RHEL 9 must have the rng-tools package installed.
RHEL-09-231010V2R1A separate RHEL 9 file system must be used for user home directories (such as /home or an equivalent).
RHEL-09-231015V2R1RHEL 9 must use a separate file system for /tmp.
RHEL-09-231020V2R1RHEL 9 must use a separate file system for /var.
RHEL-09-231025V2R1RHEL 9 must use a separate file system for /var/log.
RHEL-09-231035V2R1RHEL 9 must use a separate file system for /var/tmp.
RHEL-09-231055V2R1RHEL 9 must prevent code from being executed on file systems that contain user home directories.
RHEL-09-231060V2R1RHEL 9 must be configured so that the Network File System (NFS) is configured to use RPCSEC_GSS.
RHEL-09-231065V2R1RHEL 9 must prevent special devices on file systems that are imported via Network File System (NFS).
RHEL-09-231070V2R1RHEL 9 must prevent code from being executed on file systems that are imported via Network File System (NFS).
RHEL-09-231075V2R1RHEL 9 must prevent files with the setuid and setgid bit set from being executed on file systems that are imported via Network File System (NFS).
RHEL-09-231080V2R1RHEL 9 must prevent code from being executed on file systems that are used with removable media.
RHEL-09-231085V2R1RHEL 9 must prevent special devices on file systems that are used with removable media.
RHEL-09-231090V2R1RHEL 9 must prevent files with the setuid and setgid bit set from being executed on file systems that are used with removable media.
RHEL-09-231200V2R1RHEL 9 must prevent special devices on non-root local partitions.
RHEL-09-232040V2R1RHEL 9 cron configuration directories must have a mode of 0700 or less permissive.
RHEL-09-232045V2R1All RHEL 9 local initialization files must have mode 0740 or less permissive.
RHEL-09-232050V2R1All RHEL 9 local interactive user home directories must have mode 0750 or less permissive.
RHEL-09-232055V2R1RHEL 9 /etc/group file must have mode 0644 or less permissive to prevent unauthorized access.
RHEL-09-232060V2R1RHEL 9 /etc/group- file must have mode 0644 or less permissive to prevent unauthorized access.
RHEL-09-232065V2R1RHEL 9 /etc/gshadow file must have mode 0000 or less permissive to prevent unauthorized access.
RHEL-09-232070V2R1RHEL 9 /etc/gshadow- file must have mode 0000 or less permissive to prevent unauthorized access.
RHEL-09-232075V2R1RHEL 9 /etc/passwd file must have mode 0644 or less permissive to prevent unauthorized access.
RHEL-09-232080V2R1RHEL 9 /etc/passwd- file must have mode 0644 or less permissive to prevent unauthorized access.
RHEL-09-232085V2R1RHEL 9 /etc/shadow- file must have mode 0000 or less permissive to prevent unauthorized access.
RHEL-09-232090V2R1RHEL 9 /etc/group file must be owned by root.
RHEL-09-232095V2R1RHEL 9 /etc/group file must be group-owned by root.
RHEL-09-232100V2R1RHEL 9 /etc/group- file must be owned by root.
RHEL-09-232105V2R1RHEL 9 /etc/group- file must be group-owned by root.
RHEL-09-232110V2R1RHEL 9 /etc/gshadow file must be owned by root.
RHEL-09-232115V2R1RHEL 9 /etc/gshadow file must be group-owned by root.
RHEL-09-232120V2R1RHEL 9 /etc/gshadow- file must be owned by root.
RHEL-09-232125V2R1RHEL 9 /etc/gshadow- file must be group-owned by root.
RHEL-09-232130V2R1RHEL 9 /etc/passwd file must be owned by root.
RHEL-09-232135V2R1RHEL 9 /etc/passwd file must be group-owned by root.
RHEL-09-232140V2R1RHEL 9 /etc/passwd- file must be owned by root.
RHEL-09-232145V2R1RHEL 9 /etc/passwd- file must be group-owned by root.
RHEL-09-232150V2R1RHEL 9 /etc/shadow file must be owned by root.
RHEL-09-232155V2R1RHEL 9 /etc/shadow file must be group-owned by root.
RHEL-09-232160V2R1RHEL 9 /etc/shadow- file must be owned by root.
RHEL-09-232165V2R1RHEL 9 /etc/shadow- file must be group-owned by root.
RHEL-09-232230V2R1RHEL 9 cron configuration files directory must be owned by root.
RHEL-09-232235V2R1RHEL 9 cron configuration files directory must be group-owned by root.
RHEL-09-232240V2R1All RHEL 9 world-writable directories must be owned by root, sys, bin, or an application user.
RHEL-09-232250V2R1All RHEL 9 local files and directories must have a valid group owner.
RHEL-09-232255V2R1All RHEL 9 local files and directories must have a valid owner.
RHEL-09-232260V2R1RHEL 9 must be configured so that all system device files are correctly labeled to prevent unauthorized modification.
RHEL-09-232265V2R1RHEL 9 /etc/crontab file must have mode 0600.
RHEL-09-232270V2R1RHEL 9 /etc/shadow file must have mode 0000 to prevent unauthorized access.
RHEL-09-251020V2R1A RHEL 9 firewall must employ a deny-all, allow-by-exception policy for allowing connections to other systems.
RHEL-09-251040V2R1RHEL 9 network interfaces must not be in promiscuous mode.
RHEL-09-251045V2R1RHEL 9 must enable hardening for the Berkeley Packet Filter just-in-time compiler.
RHEL-09-252035V2R1RHEL 9 systems using Domain Name Servers (DNS) resolution must have at least two name servers configured.
RHEL-09-252040V2R1RHEL 9 must configure a DNS processing mode set be Network Manager.
RHEL-09-252045V2R1RHEL 9 must not have unauthorized IP tunnels configured.
RHEL-09-252050V2R1RHEL 9 must be configured to prevent unrestricted mail relaying.
RHEL-09-252055V2R1If the Trivial File Transfer Protocol (TFTP) server is required, RHEL 9 TFTP daemon must be configured to operate in secure mode.
RHEL-09-252065V2R1RHEL 9 libreswan package must be installed.
RHEL-09-252070V2R1There must be no shosts.equiv files on RHEL 9.
RHEL-09-252075V2R1There must be no .shosts files on RHEL 9.
RHEL-09-253010V2R1RHEL 9 must be configured to use TCP syncookies.
RHEL-09-253015V2R1RHEL 9 must ignore Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirect messages.
RHEL-09-253020V2R1RHEL 9 must not forward Internet Protocol version 4 (IPv4) source-routed packets.
RHEL-09-253025V2R1RHEL 9 must log IPv4 packets with impossible addresses.
RHEL-09-253030V2R1RHEL 9 must log IPv4 packets with impossible addresses by default.
RHEL-09-253035V2R1RHEL 9 must use reverse path filtering on all IPv4 interfaces.
RHEL-09-253040V2R1RHEL 9 must prevent IPv4 Internet Control Message Protocol (ICMP) redirect messages from being accepted.
RHEL-09-253045V2R1RHEL 9 must not forward IPv4 source-routed packets by default.
RHEL-09-253050V2R1RHEL 9 must use a reverse-path filter for IPv4 network traffic when possible by default.
RHEL-09-253055V2R1RHEL 9 must not respond to Internet Control Message Protocol (ICMP) echoes sent to a broadcast address.
RHEL-09-253060V2R1RHEL 9 must limit the number of bogus Internet Control Message Protocol (ICMP) response errors logs.
RHEL-09-253065V2R1RHEL 9 must not send Internet Control Message Protocol (ICMP) redirects.
RHEL-09-253070V2R1RHEL 9 must not allow interfaces to perform Internet Control Message Protocol (ICMP) redirects by default.
RHEL-09-253075V2R1RHEL 9 must not enable IPv4 packet forwarding unless the system is a router.
RHEL-09-254010V2R1RHEL 9 must not accept router advertisements on all IPv6 interfaces.
RHEL-09-254015V2R1RHEL 9 must ignore IPv6 Internet Control Message Protocol (ICMP) redirect messages.
RHEL-09-254020V2R1RHEL 9 must not forward IPv6 source-routed packets.
RHEL-09-254025V2R1RHEL 9 must not enable IPv6 packet forwarding unless the system is a router.
RHEL-09-254030V2R1RHEL 9 must not accept router advertisements on all IPv6 interfaces by default.
RHEL-09-254035V2R1RHEL 9 must prevent IPv6 Internet Control Message Protocol (ICMP) redirect messages from being accepted.
RHEL-09-254040V2R1RHEL 9 must not forward IPv6 source-routed packets by default.
RHEL-09-255020V2R1RHEL 9 must have the openssh-clients package installed.
RHEL-09-255105V2R1RHEL 9 SSH server configuration file must be group-owned by root.
RHEL-09-255110V2R1RHEL 9 SSH server configuration file must be owned by root.
RHEL-09-255115V2R1RHEL 9 SSH server configuration file must have mode 0600 or less permissive.
RHEL-09-255120V2R1RHEL 9 SSH private host key files must have mode 0640 or less permissive.
RHEL-09-255125V2R1RHEL 9 SSH public host key files must have mode 0644 or less permissive.
RHEL-09-255130V2R1RHEL 9 SSH daemon must not allow compression or must only allow compression after successful authentication.
RHEL-09-255145V2R1RHEL 9 SSH daemon must not allow rhosts authentication.
RHEL-09-255150V2R1RHEL 9 SSH daemon must not allow known hosts authentication.
RHEL-09-255155V2R1RHEL 9 SSH daemon must disable remote X connections for interactive users.
RHEL-09-255160V2R1RHEL 9 SSH daemon must perform strict mode checking of home directory configuration files.
RHEL-09-255165V2R1RHEL 9 SSH daemon must display the date and time of the last successful account logon upon an SSH logon.
RHEL-09-255170V2R1RHEL 9 SSH daemon must be configured to use privilege separation.
RHEL-09-255175V2R1RHEL 9 SSH daemon must prevent remote hosts from connecting to the proxy display.
RHEL-09-271090V2R1RHEL 9 effective dconf policy must match the policy keyfiles.
RHEL-09-271095V2R1RHEL 9 must disable the ability of a user to restart the system from the login screen.
RHEL-09-271100V2R1RHEL 9 must prevent a user from overriding the disable-restart-buttons setting for the graphical user interface.
RHEL-09-271105V2R1RHEL 9 must disable the ability of a user to accidentally press Ctrl-Alt-Del and cause a system to shut down or reboot.
RHEL-09-271110V2R1RHEL 9 must prevent a user from overriding the Ctrl-Alt-Del sequence settings for the graphical user interface.
RHEL-09-271115V2R1RHEL 9 must disable the user list at logon for graphical user interfaces.
RHEL-09-411020V2R1All RHEL 9 local interactive user accounts must be assigned a home directory upon creation.
RHEL-09-411025V2R1RHEL 9 must set the umask value to 077 for all local interactive user accounts.
RHEL-09-411035V2R1RHEL 9 system accounts must not have an interactive login shell.
RHEL-09-411055V2R1Executable search paths within the initialization files of all local interactive RHEL 9 users must only contain paths that resolve to the system default or the users home directory.
RHEL-09-411060V2R1All RHEL 9 local interactive users must have a home directory assigned in the /etc/passwd file.
RHEL-09-411065V2R1All RHEL 9 local interactive user home directories defined in the /etc/passwd file must exist.
RHEL-09-411070V2R1All RHEL 9 local interactive user home directories must be group-owned by the home directory owner's primary group.
RHEL-09-411095V2R1RHEL 9 must not have unauthorized accounts.
RHEL-09-411100V2R1The root account must be the only account having unrestricted access to RHEL 9 system.
RHEL-09-411115V2R1Local RHEL 9 initialization files must not execute world-writable programs.
RHEL-09-412075V2R1RHEL 9 must display the date and time of the last successful account logon upon logon.
RHEL-09-431025V2R1RHEL 9 must have policycoreutils package installed.
RHEL-09-431030V2R1RHEL 9 policycoreutils-python-utils package must be installed.
RHEL-09-432020V2R1RHEL 9 must use the invoking user's password for privilege escalation when using "sudo".
RHEL-09-432030V2R1RHEL 9 must restrict privilege elevation to authorized personnel.
RHEL-09-611025V2R1RHEL 9 must not allow blank or null passwords.
RHEL-09-611045V2R1RHEL 9 must ensure the password complexity module is enabled in the system-auth file.
RHEL-09-611155V2R1RHEL 9 must not have accounts configured with blank or null passwords.
RHEL-09-651020V2R1RHEL 9 must use a file integrity tool that is configured to use FIPS 140-3-approved cryptographic hashes for validating file contents and directories.
RHEL-09-651030V2R1RHEL 9 must be configured so that the file integrity tool verifies Access Control Lists (ACLs).
RHEL-09-651035V2R1RHEL 9 must be configured so that the file integrity tool verifies extended attributes.
RHEL-09-652015V2R1RHEL 9 must have the packages required for encrypting offloaded audit logs installed.
RHEL-09-652020V2R1The rsyslog service on RHEL 9 must be active.
RHEL-09-652025V2R1RHEL 9 must be configured so that the rsyslog daemon does not accept log messages from other servers unless the server is being used for log aggregation.
RHEL-09-652060V2R1RHEL 9 must use cron logging.
RHEL-09-653105V2R1RHEL 9 must write audit records to disk.
OL09-00-000003V1R1OL 9 must be configured so that a separate file system must be used for user home directories (such as /home or an equivalent).
OL09-00-000004V1R1OL 9 must use a separate file system for /tmp.
OL09-00-000005V1R1OL 9 must use a separate file system for /var.
OL09-00-000006V1R1OL 9 must use a separate file system for /var/log.
OL09-00-000007V1R1OL 9 must use a separate file system for /var/tmp.
OL09-00-000015V1R1OL 9 vendor packaged system security patches and updates must be installed and up to date.
OL09-00-000020V1R1OL 9 must be configured so that the graphical display manager is not the default target unless approved.
OL09-00-000135V1R1OL 9 must not have a Trivial File Transfer Protocol (TFTP) server package installed.
OL09-00-000140V1R1OL 9 must not have the quagga package installed.
OL09-00-000145V1R1OL 9 must not have a graphical display manager installed unless approved.
OL09-00-000210V1R1OL 9 policycoreutils-python-utils package must be installed.
OL09-00-000224V1R1OL 9 must be configured so that the firewall employs a deny-all, allow-by-exception policy for allowing connections to other systems.
OL09-00-000231V1R1OL 9 must use the invoking user's password for privilege escalation when using sudo.
OL09-00-000232V1R1OL 9 must restrict privilege elevation to authorized personnel.
OL09-00-000243V1R1OL 9 must be configured so that the cryptographic hashes of system files match vendor values.
OL09-00-000260V1R1OL 9 must have the openssh-clients package installed.
OL09-00-000302V1R1OL 9 must use a file integrity tool that is configured to use FIPS 140-3-approved cryptographic hashes for validating file contents and directories.
OL09-00-000303V1R1OL 9 must be configured so that the file integrity tool verifies Access Control Lists (ACLs).
OL09-00-000304V1R1OL 9 must be configured so that the file integrity tool verifies extended attributes.
OL09-00-000351V1R1OL 9 must be configured so that the rsyslog service is active.
OL09-00-000360V1R1OL 9 must enable the hardware random number generator entropy gatherer service.
OL09-00-000370V1R1OL 9 must have the rng-tools package installed.
OL09-00-000380V1R1OL 9 must have the nss-tools package installed.
OL09-00-000430V1R1OL 9 must have the gnutls-utils package installed.
OL09-00-000880V1R1OL 9 must write audit records to disk.
OL09-00-001000V1R1OL 9 must ensure the password complexity module is enabled in the system-auth file.
OL09-00-001110V1R1OL 9 must not allow blank or null passwords.
OL09-00-001130V1R1OL 9 must not have accounts configured with blank or null passwords.
OL09-00-002010V1R1OL 9 must be configured so that the Network File System (NFS) is configured to use RPCSEC_GSS.
OL09-00-002011V1R1OL 9 must prevent special devices on file systems that are imported via Network File System (NFS).
OL09-00-002012V1R1OL 9 must prevent code from being executed on file systems that are imported via Network File System (NFS).
OL09-00-002013V1R1OL 9 must prevent files with the setuid and setgid bit set from being executed on file systems that are imported via Network File System (NFS).
OL09-00-002020V1R1OL 9 must prevent code from being executed on file systems that are used with removable media.
OL09-00-002021V1R1OL 9 must prevent special devices on file systems that are used with removable media.
OL09-00-002022V1R1OL 9 must prevent files with the setuid and setgid bit set from being executed on file systems that are used with removable media.
OL09-00-002072V1R1OL 9 must prevent code from being executed on file systems that contain user home directories.
OL09-00-002080V1R1OL 9 must prevent special devices on nonroot local partitions.
OL09-00-002102V1R1OL 9 must disable the user list at logon for graphical user interfaces.
OL09-00-002107V1R1OL 9 must disable the ability of a user to accidentally press Ctrl-Alt-Del and cause a system to shut down or reboot.
OL09-00-002127V1R1OL 9 must disable the ability of a user to restart the system from the login screen.
OL09-00-002128V1R1OL 9 must prevent a user from overriding the disable-restart-buttons setting for the graphical user interface.
OL09-00-002129V1R1OL 9 must prevent a user from overriding the Ctrl-Alt-Del sequence settings for the graphical user interface.
OL09-00-002162V1R1OL 9 effective dconf policy must match the policy keyfiles.
OL09-00-002301V1R1OL 9 must define default permissions for the bash shell.
OL09-00-002302V1R1OL 9 must define default permissions for the c shell.
OL09-00-002303V1R1OL 9 must define default permissions for the system default profile.
OL09-00-002348V1R1OL 9 SSH daemon must not allow rhosts authentication.
OL09-00-002349V1R1OL 9 SSH daemon must not allow known hosts authentication.
OL09-00-002350V1R1OL 9 SSH daemon must disable remote X connections for interactive users.
OL09-00-002351V1R1OL 9 SSH daemon must perform strict mode checking of home directory configuration files.
OL09-00-002352V1R1OL 9 SSH daemon must display the date and time of the last successful account logon upon an SSH logon.
OL09-00-002354V1R1OL 9 SSH daemon must prevent remote hosts from connecting to the proxy display.
OL09-00-002355V1R1OL 9 SSH daemon must not allow compression or must only allow compression after successful authentication.
OL09-00-002360V1R1OL 9 must require reauthentication when using the "sudo" command.
OL09-00-002370V1R1OL 9 must disable the use of user namespaces.
OL09-00-002380V1R1OL 9 must disable the kernel.core_pattern.
OL09-00-002381V1R1OL 9 must disable core dump backtraces.
OL09-00-002382V1R1OL 9 must disable storing core dumps.
OL09-00-002383V1R1OL 9 must disable core dumps for all users.
OL09-00-002384V1R1OL 9 must disable acquiring, saving, and processing core dumps.
OL09-00-002385V1R1OL 9 must be configured so that the kdump service is disabled.
OL09-00-002392V1R1OL 9 must disable the ability of systemd to spawn an interactive boot process.
OL09-00-002419V1R1OL 9 file systems must not contain shosts.equiv files.
OL09-00-002420V1R1OL 9 file systems must not contain .shosts files.
OL09-00-002425V1R1OL 9 must be configured to prevent unrestricted mail relaying.
OL09-00-002426V1R1OL 9 Trivial File Transfer Protocol (TFTP) daemon must be configured to operate in secure mode if the TFTP server is required.
OL09-00-002427V1R1OL 9 must be configured so that local initialization files do not execute world-writable programs.
OL09-00-002430V1R1OL 9 must enable hardening for the Berkeley Packet Filter (BPF) just-in-time compiler.
OL09-00-002500V1R1OL 9 must be configured so that all system device files are correctly labeled to prevent unauthorized modification.
OL09-00-002501V1R1OL 9 must not have unauthorized accounts.
OL09-00-002502V1R1OL 9 SSH private host key files must have mode 0640 or less permissive.
OL09-00-002503V1R1OL 9 SSH public host key files must have mode 0644 or less permissive.
OL09-00-002507V1R1OL 9 SSH server configuration file must be group-owned by root.
OL09-00-002508V1R1OL 9 SSH server configuration file must be owned by root.
OL09-00-002509V1R1OL 9 SSH server configuration file must have mode 0600 or less permissive.
OL09-00-002511V1R1OL 9 local files and directories must have a valid group owner.
OL09-00-002512V1R1OL 9 local files and directories must have a valid owner.
OL09-00-002513V1R1OL 9 local initialization files must have mode 0740 or less permissive.
OL09-00-002514V1R1OL 9 local interactive user home directories must be group-owned by the home directory owner's primary group.
OL09-00-002515V1R1OL 9 local interactive user home directories must have mode 0750 or less permissive.
OL09-00-002530V1R1OL 9 /boot/grub2/grub.cfg file must be group-owned by root.
OL09-00-002531V1R1OL 9 /boot/grub2/grub.cfg file must be owned by root.
OL09-00-002532V1R1OL 9 /etc/group file must be group-owned by root.
OL09-00-002533V1R1OL 9 /etc/group- file must be group-owned by root.
OL09-00-002534V1R1OL 9 /etc/group file must be owned by root.
OL09-00-002535V1R1OL 9 /etc/group- file must be owned by root.
OL09-00-002536V1R1OL 9 /etc/group file must have mode 0644 or less permissive to prevent unauthorized access.
OL09-00-002537V1R1OL 9 /etc/group- file must have mode 0644 or less permissive to prevent unauthorized access.
OL09-00-002538V1R1OL 9 /etc/gshadow file must be group-owned by root.
OL09-00-002539V1R1OL 9 /etc/gshadow- file must be group-owned by root.
OL09-00-002540V1R1OL 9 /etc/gshadow file must be owned by root.
OL09-00-002541V1R1OL 9 /etc/gshadow- file must be owned by root.
OL09-00-002542V1R1OL 9 /etc/gshadow file must have mode 0000 or less permissive to prevent unauthorized access.
OL09-00-002543V1R1OL 9 /etc/gshadow- file must have mode 0000 or less permissive to prevent unauthorized access.
OL09-00-002544V1R1OL 9 /etc/passwd file must be group-owned by root.
OL09-00-002545V1R1OL 9 /etc/passwd- file must be group-owned by root.
OL09-00-002546V1R1OL 9 /etc/passwd file must be owned by root.
OL09-00-002547V1R1OL 9 /etc/passwd- file must be owned by root.
OL09-00-002548V1R1OL 9 /etc/passwd file must have mode 0644 or less permissive to prevent unauthorized access.
OL09-00-002549V1R1OL 9 /etc/passwd- file must have mode 0644 or less permissive to prevent unauthorized access.
OL09-00-002550V1R1OL 9 /etc/shadow file must be group-owned by root.
OL09-00-002551V1R1OL 9 /etc/shadow- file must be group-owned by root.
OL09-00-002552V1R1OL 9 /etc/shadow file must be owned by root.
OL09-00-002553V1R1OL 9 /etc/shadow- file must be owned by root.
OL09-00-002554V1R1OL 9 /etc/shadow- file must have mode 0000 or less permissive to prevent unauthorized access.
OL09-00-002555V1R1OL 9 /etc/shadow file must have mode 0000 to prevent unauthorized access.
OL09-00-002580V1R1OL 9 cron configuration directories must have a mode of 0700 or less permissive.
OL09-00-002581V1R1OL 9 cron configuration files directory must be group-owned by root.
OL09-00-002582V1R1OL 9 cron configuration files directory must be owned by root.
OL09-00-002583V1R1OL 9 /etc/crontab file must have mode 0600.
OL09-00-003000V1R1OL 9 must be configured so that the root account is the only account having unrestricted access to the system.
OL09-00-003002V1R1OL 9 local interactive users must have a home directory assigned in the /etc/passwd file.
OL09-00-003050V1R1OL 9 local interactive user home directories defined in the /etc/passwd file must exist.
OL09-00-003051V1R1OL 9 system accounts must not have an interactive login shell.
OL09-00-003052V1R1OL 9 local interactive user accounts must be assigned a home directory upon creation.
OL09-00-003053V1R1OL 9 must be configured so that executable search paths within the initialization files of all local interactive users must only contain paths that resolve to the system default or the users home directory.
OL09-00-003060V1R1OL 9 must set the umask value to 077 for all local interactive user accounts.
OL09-00-005010V1R1OL 9 must use cron logging.
OL09-00-005030V1R1OL 9 must be configured so that the rsyslog daemon does not accept log messages from other servers unless the server is being used for log aggregation.
OL09-00-006002V1R1OL 9 must configure a DNS processing mode set be Network Manager.
OL09-00-006003V1R1OL 9 systems using Domain Name Servers (DNS) resolution must have at least two name servers configured.
OL09-00-006004V1R1OL 9 network interfaces must not be in promiscuous mode.
OL09-00-006010V1R1OL 9 must not have unauthorized IP tunnels configured.
OL09-00-006020V1R1OL 9 must ignore Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirect messages.
OL09-00-006021V1R1OL 9 must not forward Internet Protocol version 4 (IPv4) source-routed packets.
OL09-00-006022V1R1OL 9 must log IPv4 packets with impossible addresses.
OL09-00-006023V1R1OL 9 must log IPv4 packets with impossible addresses by default.
OL09-00-006024V1R1OL 9 must use reverse path filtering on all IPv4 interfaces.
OL09-00-006025V1R1OL 9 must prevent IPv4 Internet Control Message Protocol (ICMP) redirect messages from being accepted.
OL09-00-006026V1R1OL 9 must not forward IPv4 source-routed packets by default.
OL09-00-006027V1R1OL 9 must use a reverse-path filter for IPv4 network traffic, when possible, by default.
OL09-00-006028V1R1OL 9 must not enable IPv4 packet forwarding unless the system is a router.
OL09-00-006030V1R1OL 9 must not respond to Internet Control Message Protocol (ICMP) echoes sent to a broadcast address.
OL09-00-006031V1R1OL 9 must limit the number of bogus Internet Control Message Protocol (ICMP) response errors logs.
OL09-00-006032V1R1OL 9 must not send Internet Control Message Protocol (ICMP) redirects.
OL09-00-006033V1R1OL 9 must not allow interfaces to perform Internet Control Message Protocol (ICMP) redirects by default.
OL09-00-006040V1R1OL 9 must not accept router advertisements on all IPv6 interfaces.
OL09-00-006041V1R1OL 9 must ignore IPv6 Internet Control Message Protocol (ICMP) redirect messages.
OL09-00-006042V1R1OL 9 must not forward IPv6 source-routed packets.
OL09-00-006043V1R1OL 9 must not enable IPv6 packet forwarding unless the system is a router.
OL09-00-006044V1R1OL 9 must not accept router advertisements on all IPv6 interfaces by default.
OL09-00-006045V1R1OL 9 must prevent IPv6 Internet Control Message Protocol (ICMP) redirect messages from being accepted.
OL09-00-006046V1R1OL 9 must not forward IPv6 source-routed packets by default.
WN16-00-000010V2R10Users with Administrative privileges must have separate accounts for administrative duties and normal operational tasks.
WN16-00-000040V2R10Administrative accounts must not be used with applications that access the Internet, such as web browsers, or with potential Internet sources, such as email.
WN16-00-000050V2R10Members of the Backup Operators group must have separate accounts for backup duties and normal operational tasks.
WN16-00-000070V2R10Manually managed application account passwords must be changed at least annually or when a system administrator with knowledge of the password leaves the organization.
WN16-00-000100V2R10Windows Server 2016 domain-joined systems must have a Trusted Platform Module (TPM) enabled and ready for use.
WN16-00-000110V2R10Systems must be maintained at a supported servicing level.
WN16-00-000120V2R10The Windows Server 2016 system must use an anti-virus program.
WN16-00-000140V2R10Servers must have a host-based intrusion detection or prevention system.
WN16-00-000270V2R10Software certificate installation files must be removed from Windows Server 2016.
WN16-00-000310V2R10A host-based firewall must be installed and enabled on the system.
WN16-00-000430V2R10FTP servers must be configured to prevent anonymous logons.
WN16-00-000440V2R10FTP servers must be configured to prevent access to the system drive.
WN16-00-000460V2R10Orphaned security identifiers (SIDs) must be removed from user rights on Windows 2016.
WN16-00-000470V2R10Secure Boot must be enabled on Windows Server 2016 systems.
WN16-00-000480V2R10Windows 2016 systems must have Unified Extensible Firmware Interface (UEFI) firmware and be configured to run in UEFI mode, not Legacy BIOS.
WN16-CC-000040V2R10Internet Protocol version 6 (IPv6) source routing must be configured to the highest protection level to prevent IP source routing.
WN16-CC-000050V2R10Source routing must be configured to the highest protection level to prevent Internet Protocol (IP) source routing.
WN16-CC-000060V2R10Windows Server 2016 must be configured to prevent Internet Control Message Protocol (ICMP) redirects from overriding Open Shortest Path First (OSPF)-generated routes.
WN16-CC-000080V2R10Insecure logons to an SMB server must be disabled.
WN16-CC-000090V2R10Hardened UNC paths must be defined to require mutual authentication and integrity for at least the \\*\SYSVOL and \\*\NETLOGON shares.
WN16-CC-000110V2R10Windows Server 2016 virtualization-based security must be enabled with the platform security level configured to Secure Boot or Secure Boot with DMA Protection.
WN16-CC-000140V2R10Early Launch Antimalware, Boot-Start Driver Initialization Policy must prevent boot drivers identified as bad.
WN16-CC-000150V2R10Group Policy objects must be reprocessed even if they have not changed.
WN16-CC-000210V2R10Users must be prompted to authenticate when the system wakes from sleep (on battery).
WN16-CC-000220V2R10Users must be prompted to authenticate when the system wakes from sleep (plugged in).
WN16-CC-000290V2R10Windows Telemetry must be configured to Security or Basic.
WN16-CC-000350V2R10Turning off File Explorer heap termination on corruption must be disabled.
WN16-CC-000360V2R10File Explorer shell protocol must run in protected mode.
WN16-CC-000420V2R10Attachments must be prevented from being downloaded from RSS feeds.
WN16-CC-000470V2R10Users must be notified if a web-based program attempts to install software.
WN16-DC-000150V2R10Directory data (outside the root DSE) of a non-public directory must be configured to prevent anonymous access.
WN16-DC-000330V2R10Domain controllers must be configured to allow reset of machine account passwords.
WN16-DC-000430V2R10The password for the krbtgt account on a domain must be reset at least every 180 days.
WN16-MS-000050V2R10Caching of logon credentials must be limited.
WN16-MS-000120V2R10Windows Server 2016 must be running Credential Guard on domain-joined member servers.
WN16-SO-000020V2R10Local accounts with blank passwords must be restricted to prevent access from the network.
WN16-SO-000030V2R10Windows Server 2016 built-in administrator account must be renamed.
WN16-SO-000040V2R10Windows Server 2016 built-in guest account must be renamed.
WN16-SO-000120V2R10The maximum age for machine account passwords must be configured to 30 days or less.
WN16-SO-000180V2R10The Smart Card removal option must be configured to Force Logoff or Lock Workstation.
WN16-SO-000250V2R10Anonymous SID/Name translation must not be allowed.
WN16-SO-000260V2R10Anonymous enumeration of Security Account Manager (SAM) accounts must not be allowed.
WN16-SO-000290V2R10Windows Server 2016 must be configured to prevent anonymous users from having the same permissions as the Everyone group.
WN16-SO-000320V2R10Services using Local System that use Negotiate when reverting to NTLM authentication must use the computer identity instead of authenticating anonymously.
WN16-SO-000330V2R10NTLM must be prevented from falling back to a Null session.
WN16-SO-000340V2R10PKU2U authentication using online identities must be prevented.
WN16-SO-000380V2R10The LAN Manager authentication level must be set to send NTLMv2 response only and to refuse LM and NTLM.
WN16-SO-000390V2R10Windows Server 2016 must be configured to at least negotiate signing for LDAP client signing.
WN16-SO-000400V2R10Session security for NTLM SSP-based clients must be configured to require NTLMv2 session security and 128-bit encryption.
WN16-SO-000410V2R10Session security for NTLM SSP-based servers must be configured to require NTLMv2 session security and 128-bit encryption.
WN16-SO-000450V2R10The default permissions of global system objects must be strengthened.
WN16-UC-000030V2R10Zone information must be preserved when saving attachments.
SLES-15-010000V1R9The SUSE operating system must be a vendor-supported release.
SLES-15-010010V1R9Vendor-packaged SUSE operating system security patches and updates must be installed and up to date.
SLES-15-020080V1R9The SUSE operating system must display the date and time of the last successful account logon upon logon.
SLES-15-020090V1R9The SUSE operating system must not have unnecessary accounts.
SLES-15-020091V1R9The SUSE operating system must not have unnecessary account capabilities.
SLES-15-020100V1R9The SUSE operating system root account must be the only account with unrestricted access to the system.
SLES-15-020101V1R9The SUSE operating system must restrict privilege elevation to authorized personnel.
SLES-15-020103V1R9The SUSE operating system must use the invoking user's password for privilege escalation when using "sudo".
SLES-15-020110V1R9All SUSE operating system local interactive user accounts, upon creation, must be assigned a home directory.
SLES-15-020120V1R9The SUSE operating system must display the date and time of the last successful account logon upon an SSH logon.
SLES-15-020300V1R9The SUSE operating system must not be configured to allow blank or null passwords.
SLES-15-030810V1R9The SUSE operating system must use a separate file system for the system audit data path.
SLES-15-030820V1R9The SUSE operating system must not disable syscall auditing.
SLES-15-040020V1R9There must be no .shosts files on the SUSE operating system.
SLES-15-040030V1R9There must be no shosts.equiv files on the SUSE operating system.
SLES-15-040040V1R9The SUSE operating system file integrity tool must be configured to verify Access Control Lists (ACLs).
SLES-15-040050V1R9The SUSE operating system file integrity tool must be configured to verify extended attributes.
SLES-15-040060V1R9The SUSE operating system must disable the x86 Ctrl-Alt-Delete key sequence.
SLES-15-040061V1R9The SUSE operating system must disable the x86 Ctrl-Alt-Delete key sequence for Graphical User Interfaces.
SLES-15-040062V1R9The SUSE operating system must disable the systemd Ctrl-Alt-Delete burst key sequence.
SLES-15-040070V1R9All SUSE operating system local interactive users must have a home directory assigned in the /etc/passwd file.
SLES-15-040080V1R9All SUSE operating system local interactive user home directories defined in the /etc/passwd file must exist.
SLES-15-040090V1R9All SUSE operating system local interactive user home directories must have mode 0750 or less permissive.
SLES-15-040100V1R9All SUSE operating system local interactive user home directories must be group-owned by the home directory owner's primary group.
SLES-15-040110V1R9All SUSE operating system local initialization files must have mode 0740 or less permissive.
SLES-15-040120V1R9All SUSE operating system local interactive user initialization files executable search paths must contain only paths that resolve to the users home directory.
SLES-15-040130V1R9All SUSE operating system local initialization files must not execute world-writable programs.
SLES-15-040140V1R9SUSE operating system file systems that contain user home directories must be mounted to prevent files with the setuid and setgid bit set from being executed.
SLES-15-040150V1R9SUSE operating system file systems that are used with removable media must be mounted to prevent files with the setuid and setgid bit set from being executed.
SLES-15-040160V1R9SUSE operating system file systems that are being imported via Network File System (NFS) must be mounted to prevent files with the setuid and setgid bit set from being executed.
SLES-15-040170V1R9SUSE operating system file systems that are being imported via Network File System (NFS) must be mounted to prevent binary files from being executed.
SLES-15-040180V1R9All SUSE operating system world-writable directories must be group-owned by root, sys, bin, or an application group.
SLES-15-040190V1R9SUSE operating system kernel core dumps must be disabled unless needed.
SLES-15-040200V1R9A separate file system must be used for SUSE operating system user home directories (such as /home or an equivalent).
SLES-15-040210V1R9The SUSE operating system must use a separate file system for /var.
SLES-15-040220V1R9The SUSE operating system must be configured to not overwrite Pluggable Authentication Modules (PAM) configuration on package changes.
SLES-15-040230V1R9The SUSE operating system SSH daemon must be configured to not allow authentication using known hosts authentication.
SLES-15-040240V1R9The SUSE operating system SSH daemon public host key files must have mode 0644 or less permissive.
SLES-15-040250V1R9The SUSE operating system SSH daemon private host key files must have mode 0640 or less permissive.
SLES-15-040260V1R9The SUSE operating system SSH daemon must perform strict mode checking of home directory configuration files.
SLES-15-040290V1R9The SUSE operating system SSH daemon must disable forwarded remote X connections for interactive users, unless to fulfill documented and validated mission requirements.
SLES-15-040300V1R9The SUSE operating system must not forward Internet Protocol version 4 (IPv4) source-routed packets.
SLES-15-040310V1R9The SUSE operating system must not forward Internet Protocol version 6 (IPv6) source-routed packets.
SLES-15-040320V1R9The SUSE operating system must not forward Internet Protocol version 4 (IPv4) source-routed packets by default.
SLES-15-040321V1R9The SUSE operating system must not forward Internet Protocol version 6 (IPv6) source-routed packets by default.
SLES-15-040330V1R9The SUSE operating system must prevent Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirect messages from being accepted.
SLES-15-040340V1R9The SUSE operating system must not allow interfaces to accept Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirect messages by default.
SLES-15-040341V1R9The SUSE operating system must prevent Internet Protocol version 6 (IPv6) Internet Control Message Protocol (ICMP) redirect messages from being accepted.
SLES-15-040350V1R9The SUSE operating system must not allow interfaces to accept Internet Protocol version 6 (IPv6) Internet Control Message Protocol (ICMP) redirect messages by default.
SLES-15-040360V1R9The SUSE operating system must not allow interfaces to send Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirect messages by default.
SLES-15-040370V1R9The SUSE operating system must not send Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirects.
SLES-15-040380V1R9The SUSE operating system must not be performing Internet Protocol version 4 (IPv4) packet forwarding unless the system is a router.
SLES-15-040381V1R9The SUSE operating system must not be performing Internet Protocol version 6 (IPv6) packet forwarding unless the system is a router.
SLES-15-040382V1R9The SUSE operating system must not be performing Internet Protocol version 6 (IPv6) packet forwarding by default unless the system is a router.
SLES-15-040390V1R9The SUSE operating system must not have network interfaces in promiscuous mode unless approved and documented.
SLES-15-040400V1R9All SUSE operating system files and directories must have a valid owner.
SLES-15-040410V1R9All SUSE operating system files and directories must have a valid group owner.
SLES-15-020099V1R9The SUSE operating system must specify the default "include" directory for the /etc/sudoers file.
SLES-15-020181V1R9The SUSE operating system must not have accounts configured with blank or null passwords.
SLES-12-010000V2R13The SUSE operating system must be a vendor-supported release.
SLES-12-010010V2R13Vendor-packaged SUSE operating system security patches and updates must be installed and up to date.
SLES-12-010231V2R13The SUSE operating system must not be configured to allow blank or null passwords.
SLES-12-010390V2R13The SUSE operating system must display the date and time of the last successful account logon upon logon.
SLES-12-010400V2R13There must be no .shosts files on the SUSE operating system.
SLES-12-010410V2R13There must be no shosts.equiv files on the SUSE operating system.
SLES-12-010520V2R13The SUSE operating system file integrity tool must be configured to verify Access Control Lists (ACLs).
SLES-12-010530V2R13The SUSE operating system file integrity tool must be configured to verify extended attributes.
SLES-12-010610V2R13The SUSE operating system must disable the x86 Ctrl-Alt-Delete key sequence.
SLES-12-010611V2R13The SUSE operating system must disable the x86 Ctrl-Alt-Delete key sequence for Graphical User Interfaces.
SLES-12-010630V2R13The SUSE operating system must not have unnecessary accounts.
SLES-12-010650V2R13The SUSE operating system root account must be the only account having unrestricted access to the system.
SLES-12-010690V2R13All SUSE operating system files and directories must have a valid owner.
SLES-12-010700V2R13All SUSE operating system files and directories must have a valid group owner.
SLES-12-010710V2R13All SUSE operating system local interactive users must have a home directory assigned in the /etc/passwd file.
SLES-12-010720V2R13All SUSE operating system local interactive user accounts, upon creation, must be assigned a home directory.
SLES-12-010730V2R13All SUSE operating system local interactive user home directories defined in the /etc/passwd file must exist.
SLES-12-010740V2R13All SUSE operating system local interactive user home directories must have mode 0750 or less permissive.
SLES-12-010750V2R13All SUSE operating system local interactive user home directories must be group-owned by the home directory owners primary group.
SLES-12-010760V2R13All SUSE operating system local initialization files must have mode 0740 or less permissive.
SLES-12-010770V2R13All SUSE operating system local interactive user initialization files executable search paths must contain only paths that resolve to the users home directory.
SLES-12-010780V2R13All SUSE operating system local initialization files must not execute world-writable programs.
SLES-12-010790V2R13SUSE operating system file systems that contain user home directories must be mounted to prevent files with the setuid and setgid bit set from being executed.
SLES-12-010800V2R13SUSE operating system file systems that are used with removable media must be mounted to prevent files with the setuid and setgid bit set from being executed.
SLES-12-010810V2R13SUSE operating system file systems that are being imported via Network File System (NFS) must be mounted to prevent files with the setuid and setgid bit set from being executed.
SLES-12-010820V2R13SUSE operating system file systems that are being imported via Network File System (NFS) must be mounted to prevent binary files from being executed.
SLES-12-010830V2R13All SUSE operating system world-writable directories must be group-owned by root, sys, bin, or an application group.
SLES-12-010840V2R13SUSE operating system kernel core dumps must be disabled unless needed.
SLES-12-010850V2R13A separate file system must be used for SUSE operating system user home directories (such as /home or an equivalent).
SLES-12-010860V2R13The SUSE operating system must use a separate file system for /var.
SLES-12-010870V2R13The SUSE operating system must use a separate file system for the system audit data path.
SLES-12-010910V2R13The SUSE operating system must be configured to not overwrite Pluggable Authentication Modules (PAM) configuration on package changes.
SLES-12-020199V2R13The SUSE operating system must not disable syscall auditing.
SLES-12-030130V2R13The SUSE operating system must display the date and time of the last successful account logon upon an SSH logon.
SLES-12-030200V2R13The SUSE operating system SSH daemon must be configured to not allow authentication using known hosts authentication.
SLES-12-030210V2R13The SUSE operating system SSH daemon public host key files must have mode 0644 or less permissive.
SLES-12-030220V2R13The SUSE operating system SSH daemon private host key files must have mode 0640 or less permissive.
SLES-12-030230V2R13The SUSE operating system SSH daemon must perform strict mode checking of home directory configuration files.
SLES-12-030240V2R13The SUSE operating system SSH daemon must use privilege separation.
SLES-12-030250V2R13The SUSE operating system SSH daemon must not allow compression or must only allow compression after successful authentication.
SLES-12-030260V2R13The SUSE operating system SSH daemon must disable forwarded remote X connections for interactive users, unless to fulfill documented and validated mission requirements.
SLES-12-030360V2R13The SUSE operating system must not forward Internet Protocol version 4 (IPv4) source-routed packets.
SLES-12-030361V2R13The SUSE operating system must not forward Internet Protocol version 6 (IPv6) source-routed packets.
SLES-12-030370V2R13The SUSE operating system must not forward Internet Protocol version 4 (IPv4) source-routed packets by default.
SLES-12-030380V2R13The SUSE operating system must not respond to Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) echoes sent to a broadcast address.
SLES-12-030390V2R13The SUSE operating system must prevent Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirect messages from being accepted.
SLES-12-030400V2R13The SUSE operating system must not allow interfaces to accept Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirect messages by default.
SLES-12-030401V2R13The SUSE operating system must not allow interfaces to accept Internet Protocol version 6 (IPv6) Internet Control Message Protocol (ICMP) redirect messages by default.
SLES-12-030410V2R13The SUSE operating system must not allow interfaces to send Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirect messages by default.
SLES-12-030420V2R13The SUSE operating system must not send Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirects.
SLES-12-030430V2R13The SUSE operating system must not be performing Internet Protocol version 4 (IPv4) packet forwarding unless the system is a router.
SLES-12-030440V2R13The SUSE operating system must not have network interfaces in promiscuous mode unless approved and documented.
SLES-12-030611V2R13The SUSE operating system must use a virus scan program.
SLES-12-030261V2R13The SUSE operating system SSH daemon must prevent remote hosts from connecting to the proxy display.
SLES-12-010111V2R13The SUSE operating system must restrict privilege elevation to authorized personnel.
SLES-12-010112V2R13The SUSE operating system must use the invoking user's password for privilege escalation when using "sudo".
SLES-12-010631V2R13The SUSE operating system must not have unnecessary account capabilities.
SLES-12-030362V2R13The SUSE operating system must not forward Internet Protocol version 6 (IPv6) source-routed packets by default.
SLES-12-030363V2R13The SUSE operating system must prevent Internet Protocol version 6 (IPv6) Internet Control Message Protocol (ICMP) redirect messages from being accepted.
SLES-12-030364V2R13The SUSE operating system must not be performing Internet Protocol version 6 (IPv6) packet forwarding unless the system is a router.
SLES-12-030365V2R13The SUSE operating system must not be performing Internet Protocol version 6 (IPv6) packet forwarding by default unless the system is a router.
SLES-12-010109V2R13The SUSE operating system must specify the default "include" directory for the /etc/sudoers file.
SLES-12-010221V2R13The SUSE operating system must not have accounts configured with blank or null passwords.
OL07-00-010020V2R14The Oracle Linux operating system must be configured so that the cryptographic hash of system files and commands matches vendor values.
OL07-00-010290V2R14The Oracle Linux operating system must not allow accounts configured with blank or null passwords.
OL07-00-020230V2R14The Oracle Linux operating system must be configured so that the x86 Ctrl-Alt-Delete key sequence is disabled on the command line.
OL07-00-020250V2R14The Oracle Linux operating system must be a vendor supported release.
OL07-00-020260V2R14The Oracle Linux operating system security patches and updates must be installed and up to date.
OL07-00-020270V2R14The Oracle Linux operating system must not have unnecessary accounts.
OL07-00-020310V2R14The Oracle Linux operating system must be configured so that the root account must be the only account having unrestricted access to the system.
OL07-00-020320V2R14The Oracle Linux operating system must be configured so that all files and directories have a valid owner.
OL07-00-020330V2R14The Oracle Linux operating system must be configured so that all files and directories have a valid group owner.
OL07-00-020610V2R14The Oracle Linux operating system must be configured so that all local interactive user accounts, upon creation, are assigned a home directory.
OL07-00-020620V2R14The Oracle Linux operating system must be configured so that all local interactive users have a home directory assigned and defined in the /etc/passwd file.
OL07-00-020630V2R14The Oracle Linux operating system must be configured so that all local interactive user home directories have mode 0750 or less permissive.
OL07-00-020640V2R14The Oracle Linux operating system must be configured so that all local interactive user home directories are owned by their respective users.
OL07-00-020650V2R14The Oracle Linux operating system must be configured so that all local interactive user home directories are group-owned by the home directory owners primary group.
OL07-00-020660V2R14The Oracle Linux operating system must be configured so that all files and directories contained in local interactive user home directories have a valid owner.
OL07-00-020670V2R14The Oracle Linux operating system must be configured so that all files and directories contained in local interactive user home directories are group-owned by a group of which the home directory owner is a member.
OL07-00-020680V2R14The Oracle Linux operating system must be configured so that all files and directories contained in local interactive user home directories have a mode of 0750 or less permissive.
OL07-00-020690V2R14The Oracle Linux operating system must be configured so that all local initialization files for interactive users are owned by the home directory user or root.
OL07-00-020700V2R14The Oracle Linux operating system must be configured so that all local initialization files for local interactive users are be group-owned by the users primary group or root.
OL07-00-020710V2R14The Oracle Linux operating system must be configured so that all local initialization files have mode 0740 or less permissive.
OL07-00-020720V2R14The Oracle Linux operating system must be configured so that all local interactive user initialization files executable search paths contain only paths that resolve to the users home directory.
OL07-00-020730V2R14The Oracle Linux operating system must be configured so that local initialization files do not execute world-writable programs.
OL07-00-020900V2R14The Oracle Linux operating system must be configured so that all system device files are correctly labeled to prevent unauthorized modification.
OL07-00-021000V2R14The Oracle Linux operating system must be configured so that file systems containing user home directories are mounted to prevent files with the setuid and setgid bit set from being executed.
OL07-00-021010V2R14The Oracle Linux operating system must prevent files with the setuid and setgid bit set from being executed on file systems that are used with removable media.
OL07-00-021020V2R14The Oracle Linux operating system must prevent files with the setuid and setgid bit set from being executed on file systems that are being imported via Network File System (NFS).
OL07-00-021021V2R14The Oracle Linux operating system must prevent binary files from being executed on file systems that are being imported via Network File System (NFS).
OL07-00-021030V2R14The Oracle Linux operating system must be configured so that all world-writable directories are group-owned by root, sys, bin, or an application group.
OL07-00-021040V2R14The Oracle Linux operating system must set the umask value to 077 for all local interactive user accounts.
OL07-00-021100V2R14The Oracle Linux operating system must have cron logging implemented.
OL07-00-021110V2R14The Oracle Linux operating system must be configured so that the cron.allow file, if it exists, is owned by root.
OL07-00-021120V2R14The Oracle Linux operating system must be configured so that the cron.allow file, if it exists, is group-owned by root.
OL07-00-021300V2R14The Oracle Linux operating system must disable Kernel core dumps unless needed.
OL07-00-021310V2R14The Oracle Linux operating system must be configured so that a separate file system is used for user home directories (such as /home or an equivalent).
OL07-00-021320V2R14The Oracle Linux operating system must use a separate file system for /var.
OL07-00-021340V2R14The Oracle Linux operating system must use a separate file system for /tmp (or equivalent).
OL07-00-021600V2R14The Oracle Linux operating system must be configured so that the file integrity tool is configured to verify Access Control Lists (ACLs).
OL07-00-021610V2R14The Oracle Linux operating system must be configured so that the file integrity tool is configured to verify extended attributes.
OL07-00-021620V2R14The Oracle Linux operating system must use a file integrity tool that is configured to use FIPS 140-2 approved cryptographic hashes for validating file contents and directories.
OL07-00-031000V2R14The Oracle Linux operating system must send rsyslog output to a log aggregation server.
OL07-00-031010V2R14The Oracle Linux operating system must be configured so that the rsyslog daemon does not accept log messages from other servers unless the server is being used for log aggregation.
OL07-00-032000V2R14The Oracle Linux operating system must use a virus scan program.
OL07-00-040330V2R14The Oracle Linux operating system must be configured so that the SSH daemon does not allow authentication using RSA rhosts authentication.
OL07-00-040350V2R14The Oracle Linux operating system must be configured so that the SSH daemon does not allow authentication using rhosts authentication.
OL07-00-040360V2R14The Oracle Linux operating system must display the date and time of the last successful account logon upon an SSH logon.
OL07-00-040370V2R14The Oracle Linux operating system must not permit direct logons to the root account using remote access via SSH.
OL07-00-040380V2R14The Oracle Linux operating system must be configured so that the SSH daemon does not allow authentication using known hosts authentication.
OL07-00-040410V2R14The Oracle Linux operating system must be configured so that the SSH public host key files have mode 0644 or less permissive.
OL07-00-040420V2R14The Oracle Linux operating system must be configured so the SSH private host key files have mode 0640 or less permissive.
OL07-00-040450V2R14The Oracle Linux operating system must be configured so that the SSH daemon performs strict mode checking of home directory configuration files.
OL07-00-040460V2R14The Oracle Linux operating system must be configured so that the SSH daemon uses privilege separation.
OL07-00-040470V2R14The Oracle Linux operating system must be configured so that the SSH daemon does not allow compression or only allows compression after successful authentication.
OL07-00-040520V2R14The Oracle Linux operating system must enable an application firewall, if available.
OL07-00-040530V2R14The Oracle Linux operating system must display the date and time of the last successful account logon upon logon.
OL07-00-040540V2R14The Oracle Linux operating system must not contain .shosts files.
OL07-00-040550V2R14The Oracle Linux operating system must not contain shosts.equiv files.
OL07-00-040600V2R14For Oracle Linux operating systems using DNS resolution, at least two name servers must be configured.
OL07-00-040610V2R14The Oracle Linux operating system must not forward Internet Protocol version 4 (IPv4) source-routed packets.
OL07-00-040611V2R14The Oracle Linux operating system must use a reverse-path filter for IPv4 network traffic when possible on all interfaces.
OL07-00-040612V2R14The Oracle Linux operating system must use a reverse-path filter for IPv4 network traffic when possible by default.
OL07-00-040620V2R14The Oracle Linux operating system must not forward Internet Protocol version 4 (IPv4) source-routed packets by default.
OL07-00-040630V2R14The Oracle Linux operating system must not respond to Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) echoes sent to a broadcast address.
OL07-00-040640V2R14The Oracle Linux operating system must prevent Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirect messages from being accepted.
OL07-00-040641V2R14The Oracle Linux operating system must ignore Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirect messages.
OL07-00-040650V2R14The Oracle Linux operating system must not allow interfaces to perform Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirects by default.
OL07-00-040660V2R14The Oracle Linux operating system must not send Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirects.
OL07-00-040670V2R14Network interfaces configured on The Oracle Linux operating system must not be in promiscuous mode.
OL07-00-040680V2R14The Oracle Linux operating system must be configured to prevent unrestricted mail relaying.
OL07-00-040690V2R14The Oracle Linux operating system must not have a File Transfer Protocol (FTP) server package installed unless needed.
OL07-00-040700V2R14The Oracle Linux operating system must not have the Trivial File Transfer Protocol (TFTP) server package installed if not required for operational support.
OL07-00-040710V2R14The Oracle Linux operating system must be configured so that remote X connections are disabled, unless to fulfill documented and validated mission requirements.
OL07-00-040720V2R14The Oracle Linux operating system must be configured so that if the Trivial File Transfer Protocol (TFTP) server is required, the TFTP daemon is configured to operate in secure mode.
OL07-00-040730V2R14The Oracle Linux operating system must not have a graphical display manager installed unless approved.
OL07-00-040740V2R14The Oracle Linux operating system must not be performing packet forwarding unless the system is a router.
OL07-00-040750V2R14The Oracle Linux operating system must be configured so that the Network File System (NFS) is configured to use RPCSEC_GSS.
OL07-00-040800V2R14SNMP community strings on the Oracle Linux operating system must be changed from the default.
OL07-00-040810V2R14The Oracle Linux operating system access control program must be configured to grant or deny system access to specific hosts and services.
OL07-00-040820V2R14The Oracle Linux operating system must not have unauthorized IP tunnels configured.
OL07-00-040830V2R14The Oracle Linux operating system must not forward IPv6 source-routed packets.
OL07-00-020231V2R14The Oracle Linux operating system must be configured so the x86 Ctrl-Alt-Delete key sequence is disabled in the Graphical User Interface.
OL07-00-021031V2R14The Oracle Linux operating system must be configured so that all world-writable directories are owned by root, sys, bin, or an application user.
OL07-00-040711V2R14The Oracle Linux operating system SSH daemon must prevent remote hosts from connecting to the proxy display.
OL07-00-010341V2R14The Oracle Linux operating system must restrict privilege elevation to authorized personnel.
OL07-00-010342V2R14The Oracle Linux operating system must use the invoking user's password for privilege escalation when using "sudo".
OL07-00-010291V2R14The Oracle Linux operating system must not have accounts configured with blank or null passwords.
OL07-00-010339V2R14The Oracle Linux operating system must specify the default "include" directory for the /etc/sudoers file.
OL07-00-010063V2R14The Oracle Linux operating system must disable the login screen user list for graphical user interfaces.
WN19-00-000010V2R8Windows Server 2019 users with Administrative privileges must have separate accounts for administrative duties and normal operational tasks.
WN19-00-000030V2R8Windows Server 2019 administrative accounts must not be used with applications that access the Internet, such as web browsers, or with potential Internet sources, such as email.
WN19-00-000040V2R8Windows Server 2019 members of the Backup Operators group must have separate accounts for backup duties and normal operational tasks.
WN19-00-000060V2R8Windows Server 2019 manually managed application account passwords must be changed at least annually or when a system administrator with knowledge of the password leaves the organization.
WN19-00-000090V2R8Windows Server 2019 domain-joined systems must have a Trusted Platform Module (TPM) enabled and ready for use.
WN19-00-000100V2R8Windows Server 2019 must be maintained at a supported servicing level.
WN19-00-000110V2R8Windows Server 2019 must use an anti-virus program.
WN19-00-000120V2R8Windows Server 2019 must have a host-based intrusion detection or prevention system.
WN19-00-000240V2R8Windows Server 2019 must have software certificate installation files removed.
WN19-00-000420V2R8Windows Server 2019 FTP servers must be configured to prevent anonymous logons.
WN19-00-000430V2R8Windows Server 2019 FTP servers must be configured to prevent access to the system drive.
WN19-00-000450V2R8Windows Server 2019 must have orphaned security identifiers (SIDs) removed from user rights.
WN19-00-000460V2R8Windows Server 2019 systems must have Unified Extensible Firmware Interface (UEFI) firmware and be configured to run in UEFI mode, not Legacy BIOS.
WN19-00-000470V2R8Windows Server 2019 must have Secure Boot enabled.
WN19-CC-000030V2R8Windows Server 2019 Internet Protocol version 6 (IPv6) source routing must be configured to the highest protection level to prevent IP source routing.
WN19-CC-000040V2R8Windows Server 2019 source routing must be configured to the highest protection level to prevent Internet Protocol (IP) source routing.
WN19-CC-000050V2R8Windows Server 2019 must be configured to prevent Internet Control Message Protocol (ICMP) redirects from overriding Open Shortest Path First (OSPF)-generated routes.
WN19-CC-000070V2R8Windows Server 2019 insecure logons to an SMB server must be disabled.
WN19-CC-000080V2R8Windows Server 2019 hardened Universal Naming Convention (UNC) paths must be defined to require mutual authentication and integrity for at least the \\*\SYSVOL and \\*\NETLOGON shares.
WN19-CC-000100V2R8Windows Server 2019 must be configured to enable Remote host allows delegation of non-exportable credentials.
WN19-CC-000110V2R8Windows Server 2019 virtualization-based security must be enabled with the platform security level configured to Secure Boot or Secure Boot with DMA Protection.
WN19-CC-000130V2R8Windows Server 2019 Early Launch Antimalware, Boot-Start Driver Initialization Policy must prevent boot drivers identified as bad.
WN19-CC-000140V2R8Windows Server 2019 group policy objects must be reprocessed even if they have not changed.
WN19-CC-000180V2R8Windows Server 2019 users must be prompted to authenticate when the system wakes from sleep (on battery).
WN19-CC-000190V2R8Windows Server 2019 users must be prompted to authenticate when the system wakes from sleep (plugged in).
WN19-CC-000250V2R8Windows Server 2019 Telemetry must be configured to Security or Basic.
WN19-CC-000260V2R8Windows Server 2019 Windows Update must not obtain updates from other PCs on the Internet.
WN19-CC-000320V2R8Windows Server 2019 Turning off File Explorer heap termination on corruption must be disabled.
WN19-CC-000330V2R8Windows Server 2019 File Explorer shell protocol must run in protected mode.
WN19-CC-000390V2R8Windows Server 2019 must prevent attachments from being downloaded from RSS feeds.
WN19-CC-000440V2R8Windows Server 2019 users must be notified if a web-based program attempts to install software.
WN19-DC-000150V2R8Windows Server 2019 directory data (outside the root DSE) of a non-public directory must be configured to prevent anonymous access.
WN19-DC-000330V2R8Windows Server 2019 domain controllers must be configured to allow reset of machine account passwords.
WN19-DC-000430V2R8The password for the krbtgt account on a domain must be reset at least every 180 days.
WN19-MS-000050V2R8Windows Server 2019 must limit the caching of logon credentials to four or less on domain-joined member servers.
WN19-MS-000140V2R8Windows Server 2019 must be running Credential Guard on domain-joined member servers.
WN19-SO-000020V2R8Windows Server 2019 must prevent local accounts with blank passwords from being used from the network.
WN19-SO-000030V2R8Windows Server 2019 built-in administrator account must be renamed.
WN19-SO-000040V2R8Windows Server 2019 built-in guest account must be renamed.
WN19-SO-000100V2R8Windows Server 2019 maximum age for machine account passwords must be configured to 30 days or less.
WN19-SO-000150V2R8Windows Server 2019 Smart Card removal option must be configured to Force Logoff or Lock Workstation.
WN19-SO-000210V2R8Windows Server 2019 must not allow anonymous SID/Name translation.
WN19-SO-000220V2R8Windows Server 2019 must not allow anonymous enumeration of Security Account Manager (SAM) accounts.
WN19-SO-000240V2R8Windows Server 2019 must be configured to prevent anonymous users from having the same permissions as the Everyone group.
WN19-SO-000260V2R8Windows Server 2019 services using Local System that use Negotiate when reverting to NTLM authentication must use the computer identity instead of authenticating anonymously.
WN19-SO-000270V2R8Windows Server 2019 must prevent NTLM from falling back to a Null session.
WN19-SO-000280V2R8Windows Server 2019 must prevent PKU2U authentication using online identities.
WN19-SO-000310V2R8Windows Server 2019 LAN Manager authentication level must be configured to send NTLMv2 response only and to refuse LM and NTLM.
WN19-SO-000320V2R8Windows Server 2019 must be configured to at least negotiate signing for LDAP client signing.
WN19-SO-000330V2R8Windows Server 2019 session security for NTLM SSP-based clients must be configured to require NTLMv2 session security and 128-bit encryption.
WN19-SO-000340V2R8Windows Server 2019 session security for NTLM SSP-based servers must be configured to require NTLMv2 session security and 128-bit encryption.
WN19-SO-000370V2R8Windows Server 2019 default permissions of global system objects must be strengthened.
WN19-UC-000010V2R8Windows Server 2019 must preserve zone information when saving attachments.
WN19-00-000280V2R8Windows Server 2019 must have a host-based firewall installed and enabled.
OL08-00-010000V1R9OL 8 must be a vendor-supported release.
OL08-00-010010V1R9OL 8 vendor-packaged system security patches and updates must be installed and up to date.
OL08-00-010382V1R9OL 8 must restrict privilege elevation to authorized personnel.
OL08-00-010383V1R9OL 8 must use the invoking user's password for privilege escalation when using "sudo".
OL08-00-010424V1R9OL 8 must not let Meltdown and Spectre exploit critical vulnerabilities in modern processors.
OL08-00-010460V1R9There must be no "shosts.equiv" files on the OL 8 operating system.
OL08-00-010470V1R9There must be no ".shosts" files on the OL 8 operating system.
OL08-00-010473V1R9OL 8 must enable the hardware random number generator entropy gatherer service.
OL08-00-010472V1R9OL 8 must have the packages required to use the hardware random number generator entropy gatherer service.
OL08-00-010480V1R9The OL 8 SSH public host key files must have mode "0644" or less permissive.
OL08-00-010490V1R9The OL 8 SSH private host key files must have mode "0640" or less permissive.
OL08-00-010500V1R9The OL 8 SSH daemon must perform strict mode checking of home directory configuration files.
OL08-00-010520V1R9The OL 8 SSH daemon must not allow authentication using known host's authentication.
OL08-00-010521V1R9The OL 8 SSH daemon must not allow Kerberos authentication, except to fulfill documented and validated mission requirements.
OL08-00-010522V1R9The OL 8 SSH daemon must not allow GSSAPI authentication, except to fulfill documented and validated mission requirements.
OL08-00-010540V1R9OL 8 must use a separate file system for "/var".
OL08-00-010541V1R9OL 8 must use a separate file system for "/var/log".
OL08-00-010542V1R9OL 8 must use a separate file system for the system audit data path.
OL08-00-010543V1R9OL 8 must use a separate file system for "/tmp".
OL08-00-010544V1R9OL 8 must use a separate file system for /var/tmp.
OL08-00-010561V1R9OL 8 must have the rsyslog service enabled and active.
OL08-00-010570V1R9OL 8 must prevent files with the setuid and setgid bit set from being executed on file systems that contain user home directories.
OL08-00-010571V1R9OL 8 must prevent files with the setuid and setgid bit set from being executed on the /boot directory.
OL08-00-010572V1R9OL 8 must prevent files with the setuid and setgid bit set from being executed on the /boot/efi directory.
OL08-00-010580V1R9OL 8 must prevent special devices on non-root local partitions.
OL08-00-010590V1R9OL 8 file systems that contain user home directories must not execute binary files.
OL08-00-010600V1R9OL 8 file systems must not interpret character or block special devices from untrusted file systems.
OL08-00-010610V1R9OL 8 file systems must not execute binary files on removable media.
OL08-00-010620V1R9OL 8 must prevent files with the setuid and setgid bit set from being executed on file systems that are used with removable media.
OL08-00-010630V1R9OL 8 file systems must not execute binary files that are imported via Network File System (NFS).
OL08-00-010640V1R9OL 8 file systems must not interpret character or block special devices that are imported via NFS.
OL08-00-010650V1R9OL 8 must prevent files with the setuid and setgid bit set from being executed on file systems that are imported via Network File System (NFS).
OL08-00-010660V1R9Local OL 8 initialization files must not execute world-writable programs.
OL08-00-010671V1R9OL 8 must disable the "kernel.core_pattern".
OL08-00-010672V1R9OL 8 must disable acquiring, saving, and processing core dumps.
OL08-00-010673V1R9OL 8 must disable core dumps for all users.
OL08-00-010674V1R9OL 8 must disable storing core dumps.
OL08-00-010675V1R9OL 8 must disable core dump backtraces.
OL08-00-010680V1R9For OL 8 systems using Domain Name Servers (DNS) resolution, at least two name servers must be configured.
OL08-00-010690V1R9Executable search paths within the initialization files of all local interactive OL 8 users must only contain paths that resolve to the system default or the user's home directory.
OL08-00-010700V1R9All OL 8 world-writable directories must be owned by root, sys, bin, or an application user.
OL08-00-010710V1R9All OL 8 world-writable directories must be group-owned by root, sys, bin, or an application group.
OL08-00-010720V1R9All OL 8 local interactive users must have a home directory assigned in the "/etc/passwd" file.
OL08-00-010730V1R9All OL 8 local interactive user home directories must have mode "0750" or less permissive.
OL08-00-010731V1R9All OL 8 local interactive user home directory files must have mode "0750" or less permissive.
OL08-00-010740V1R9All OL 8 local interactive user home directories must be group-owned by the home directory owner's primary group.
OL08-00-010741V1R9OL 8 must be configured so that all files and directories contained in local interactive user home directories are group-owned by a group of which the home directory owner is a member.
OL08-00-010750V1R9All OL 8 local interactive user home directories defined in the "/etc/passwd" file must exist.
OL08-00-010760V1R9All OL 8 local interactive user accounts must be assigned a home directory upon creation.
OL08-00-010770V1R9All OL 8 local initialization files must have mode "0740" or less permissive.
OL08-00-010780V1R9All OL 8 files and directories must have a valid owner.
OL08-00-010790V1R9All OL 8 files and directories must have a valid group owner.
OL08-00-010800V1R9A separate OL 8 filesystem must be used for user home directories (such as "/home" or an equivalent).
OL08-00-020032V1R9OL 8 must disable the user list at logon for graphical user interfaces.
OL08-00-020320V1R9OL 8 must not have unnecessary accounts.
OL08-00-020330V1R9OL 8 must not allow accounts configured with blank or null passwords.
OL08-00-020331V1R9OL 8 must not allow blank or null passwords in the system-auth file.
OL08-00-020332V1R9OL 8 must not allow blank or null passwords in the password-auth file.
OL08-00-020340V1R9OL 8 must display the date and time of the last successful account logon upon logon.
OL08-00-020350V1R9OL 8 must display the date and time of the last successful account logon upon an SSH logon.
OL08-00-030010V1R9Cron logging must be implemented in OL 8.
OL08-00-030061V1R9The OL 8 audit system must audit local events.
OL08-00-030063V1R9OL 8 must resolve audit information before writing to disk.
OL08-00-030670V1R9OL 8 must have the packages required for offloading audit logs installed.
OL08-00-030680V1R9OL 8 must have the packages required for encrypting offloaded audit logs installed.
OL08-00-040021V1R9OL 8 must not have the asynchronous transfer mode (ATM) kernel module installed if not required for operational support.
OL08-00-040022V1R9OL 8 must not have the Controller Area Network (CAN) kernel module installed if not required for operational support.
OL08-00-040023V1R9OL 8 must not have the stream control transmission protocol (SCTP) kernel module installed if not required for operational support.
OL08-00-040170V1R9The x86 Ctrl-Alt-Delete key sequence must be disabled on OL 8.
OL08-00-040171V1R9The x86 Ctrl-Alt-Delete key sequence in OL 8 must be disabled if a graphical user interface is installed.
OL08-00-040172V1R9OL 8 must disable the systemd Ctrl-Alt-Delete burst key sequence.
OL08-00-040180V1R9OL 8 must disable the debug-shell systemd service.
OL08-00-040190V1R9The Trivial File Transfer Protocol (TFTP) server package must not be installed if not required for OL 8 operational support.
OL08-00-040200V1R9The root account must be the only account having unrestricted access to the OL 8 system.
OL08-00-040209V1R9OL 8 must prevent IPv4 Internet Control Message Protocol (ICMP) redirect messages from being accepted.
OL08-00-040210V1R9OL 8 must prevent IPv6 Internet Control Message Protocol (ICMP) redirect messages from being accepted.
OL08-00-040220V1R9OL 8 must not send Internet Control Message Protocol (ICMP) redirects.
OL08-00-040230V1R9OL 8 must not respond to Internet Control Message Protocol (ICMP) echoes sent to a broadcast address.
OL08-00-040239V1R9OL 8 must not forward IPv4 source-routed packets.
OL08-00-040240V1R9OL 8 must not forward IPv6 source-routed packets.
OL08-00-040249V1R9OL 8 must not forward IPv4 source-routed packets by default.
OL08-00-040250V1R9OL 8 must not forward IPv6 source-routed packets by default.
OL08-00-040260V1R9OL 8 must not enable IPv6 packet forwarding unless the system is a router.
OL08-00-040261V1R9OL 8 must not accept router advertisements on all IPv6 interfaces.
OL08-00-040262V1R9OL 8 must not accept router advertisements on all IPv6 interfaces by default.
OL08-00-040270V1R9OL 8 must not allow interfaces to perform Internet Control Message Protocol (ICMP) redirects by default.
OL08-00-040279V1R9OL 8 must ignore IPv4 Internet Control Message Protocol (ICMP) redirect messages.
OL08-00-040280V1R9OL 8 must ignore IPv6 Internet Control Message Protocol (ICMP) redirect messages.
OL08-00-040281V1R9OL 8 must disable access to the network "bpf" syscall from unprivileged processes.
OL08-00-040282V1R9OL 8 must restrict the use of "ptrace" to descendant processes.
OL08-00-040283V1R9OL 8 must restrict exposed kernel pointer addresses access.
OL08-00-040284V1R9OL 8 must disable the use of user namespaces.
OL08-00-040285V1R9OL 8 must use reverse path filtering on all IPv4 interfaces.
OL08-00-040286V1R9OL 8 must enable hardening for the Berkeley Packet Filter Just-in-time compiler.
OL08-00-040290V1R9OL 8 must be configured to prevent unrestricted mail relaying.
OL08-00-040300V1R9The OL 8 file integrity tool must be configured to verify extended attributes.
OL08-00-040310V1R9The OL 8 file integrity tool must be configured to verify Access Control Lists (ACLs).
OL08-00-040320V1R9The graphical display manager must not be installed on OL 8 unless approved.
OL08-00-040330V1R9OL 8 network interfaces must not be in promiscuous mode.
OL08-00-040340V1R9OL 8 remote X connections for interactive users must be disabled unless to fulfill documented and validated mission requirements.
OL08-00-040341V1R9The OL 8 SSH daemon must prevent remote hosts from connecting to the proxy display.
OL08-00-040350V1R9If the Trivial File Transfer Protocol (TFTP) server is required, the OL 8 TFTP daemon must be configured to operate in secure mode.
OL08-00-040360V1R9A File Transfer Protocol (FTP) server package must not be installed unless mission essential on OL 8.
OL08-00-040370V1R9OL 8 must not have the "gssproxy" package installed if not required for operational support.
OL08-00-040380V1R9OL 8 must not have the "iprutils" package installed if not required for operational support.
OL08-00-040390V1R9OL 8 must not have the "tuned" package installed if not required for operational support.
OL08-00-010121V1R9The OL 8 operating system must not have accounts configured with blank or null passwords.
OL08-00-010379V1R9OL 8 must specify the default "include" directory for the /etc/sudoers file.
OL08-00-020101V1R9OL 8 must ensure the password complexity module is enabled in the system-auth file.
OL08-00-020102V1R9OL 8 systems below version 8.4 must ensure the password complexity module in the system-auth file is configured for three retries or less.
OL08-00-020103V1R9OL 8 systems below version 8.4 must ensure the password complexity module in the password-auth file is configured for three retries or less.
OL08-00-020104V1R9OL 8 systems, version 8.4 and above, must ensure the password complexity module is configured for three retries or less.
OL08-00-040259V1R9OL 8 must not enable IPv4 packet forwarding unless the system is a router.
OL08-00-040321V1R9The graphical display manager must not be the default target on OL 8 unless approved.