Require Authentication for Emergency Systemd Target
Require Authentication for Single User Mode
Verify that Interactive Boot is Disabled
Set Boot Loader Password in grub2
Set the UEFI Boot Loader Password
Set the Boot Loader Admin Username to a Non-Default Value
Set the UEFI Boot Loader Admin Username to a Non-Default Value
Set Boot Loader Password in grub2 - systems prior to version 7.2
Set the UEFI Boot Loader Password - systems prior to version 7.2
Selective Authentication must be enabled on outgoing forest trusts.
The Apache web server must use encryption strength in accordance with the categorization of data hosted by the Apache web server when remote connections are provided.
An Apache web server must maintain the confidentiality of controlled information during transmission through the use of an approved TLS version.
The ALG must enforce approved authorizations for logical access to information and system resources by employing identity-based, role-based, and/or attribute-based security policies.
The application server must enforce approved authorizations for logical access to information and system resources in accordance with applicable access control policies.
The application must enforce approved authorizations for logical access to information and system resources in accordance with applicable access control policies.
The BlackBerry Enterprise Mobility Server (BEMS) must be configured to have at least one user in the following Administrator roles: Server primary administrator, auditor.
IDMS must allow only authorized users to sign on to an IDMS CV.
IDMS must enforce applicable access control policies, even after a user successfully signs on to CV.
All installation-delivered IDMS USER-level tasks must be properly secured.
All installation-delivered IDMS DEVELOPER-level tasks must be properly secured.
All installation-delivered IDMS DBADMIN-level tasks must be properly secured.
All installation-delivered IDMS DCADMIN-level tasks must be properly secured.
All installation-delivered IDMS User-level programs must be properly secured.
All installation-delivered IDMS Developer-level Programs must be properly secured.
All installation-delivered IDMS Database-Administrator-level programs must be properly secured.
All installation-delivered IDMS DC-Administrator-level programs must be properly secured.
Citrix StoreFront server must accept Personal Identity Verification (PIV) credentials.
A policy set using the built-in role-based access control (RBAC) capabilities in the Universal Control Plane (UCP) component of Docker Enterprise must be configured.
A policy set using the built-in role-based access control (RBAC) capabilities in the Docker Trusted Registry (DTR) component of Docker Enterprise must be set.
Docker Enterprise sensitive host system directories must not be mounted on containers.
Forescout must enforce approved access by employing admissions assessment filters that include, at a minimum, device attributes such as type, IP address, resource group, and/or mission conditions as defined in Forescout System Security Plan (SSP). This is required for compliance with C2C Step 4.
Endpoint policy assessment must proceed after the endpoint attempting access has been identified using an approved identification method such as IP address. This is required for compliance with C2C Step 2.
For endpoints that require automated remediation, Forescout must be configured to redirect endpoints to a logically separate network segment for remediation services. This is required for compliance with C2C Step 4.
If a device requesting access fails Forescout policy assessment, Forescout must communicate with other components and the switch to either terminate the session or isolate the device from the trusted network for remediation. This is required for compliance with C2C Step 3.
Forescout must be configured to notify the user before proceeding with remediation of the user's endpoint device when automated remediation is used. This is required for compliance with C2C Step 3.
Forescout must be configured so that all client machines are assessed by Forescout with exceptions that are allowed to bypass Forescout based on account or account type, as approved by the information system security manager (ISSM) and documented in the System Security Plan (SSP). This is required for compliance with C2C Step 1.
Forescout appliance must not be configured to implement a DHCP layer 3 method for separation or device authorization. This is required for compliance with C2C Step 2.
Forescout must send an alert to the Information System Security Manager (ISSM) and System Administrator (SA), at a minimum, when critical security issues are found that put the network at risk. This is required for compliance with C2C Step 2.
When devices fail the policy assessment, Forescout must create a record with sufficient detail suitable for forwarding to a remediation server for automated remediation or sending to the user for manual remediation. This is required for compliance with C2C Step 3.
Forescout must place client machines on a blacklist or terminate network communications on devices when critical security issues are found that put the network at risk. This is required for compliance with C2C Step 4.
Forescout must be configured so client machines do not communicate with other network devices in the DMZ or subnet except as needed to perform a client assessment or to identify itself. This is required for compliance with C2C Step 2.
The HP FlexFabric Switch must enforce the assigned privilege level for each administrator and authorizations for access to all commands relative to the privilege level in accordance with applicable policy for the device.
The HYCU 4.1 Application must enforce the assigned privilege level for each administrator and authorizations for access to all commands relative to the privilege level in accordance with applicable policy for the device.
The DataPower Gateway must enforce the assigned privilege level for each administrator and authorizations for access to all commands relative to the privilege level in accordance with applicable policy for the device.
DB2 must enforce approved authorizations for logical access to information and system resources in accordance with applicable access control policies.
The IBM Aspera Faspex Server must restrict users from using transfer services by default.
The IBM Aspera Faspex Server must restrict users read, write, and browse permissions by default.
The IBM Aspera High-Speed Transfer Endpoint must enable password protection of the node database.
The IBM Aspera High-Speed Transfer Endpoint must restrict users from using transfer services by default.
The IBM Aspera High-Speed Transfer Endpoint must restrict users read, write, and browse permissions by default.
The IBM Aspera High-Speed Transfer Server must enable password protection of the node database.
The IBM Aspera High-Speed Transfer Server must restrict users from using transfer services by default.
The IBM Aspera High-Speed Transfer Server must restrict users read, write, and browse permissions by default.
Users in the REST API admin role must be authorized.
The WebSphere Application Server users in a local user registry group must be authorized for that group.
The WebSphere Application Server Java 2 security must be enabled.
The WebSphere Application Server Java 2 security must not be bypassed.
The WebSphere Application Server users in the admin role must be authorized.
The WebSphere Application Server LDAP groups must be authorized for the WebSphere role.
CA VM:Secure product NORULE record in the SECURITY CONFIG file must be configured to REJECT.
Java permissions must be set for hosted applications.
The Java Security Manager must be enabled for the JBoss application server.
The JBoss server must be configured with Role Based Access Controls.
Users in JBoss Management Security Realms must be in the appropriate role.
Silent Authentication must be removed from the Default Application Security Realm.
Silent Authentication must be removed from the Default Management Security Realm.
JBoss management interfaces must be secured.
The Sentry must enforce approved authorizations for logical access to information and system resources by enabling identity-based, role-based, and/or attribute-based security policies. These controls are enabled in MobileIron UEM (MobileIron Core) and applied by the Sentry for conditional access enforcement.
For User Role Firewalls, the Juniper SRX Services Gateway Firewall must employ user attribute-based security policies to enforce approved authorizations for logical access to information and system resources.
The Juniper SRX Services Gateway must enforce the assigned privilege level for each administrator and authorizations for access to all commands by assigning a login class to all AAA-authenticated users.
The Mainframe Product must enforce approved authorizations for logical access to sensitive information and system resources in accordance with applicable access control policies.
The Mainframe Product must enforce approved authorizations for security administrator access to sensitive information and system resources in accordance with applicable access control policies.
The Mainframe Product must enforce approved authorizations for system programmer access to sensitive information and system resources in accordance with applicable access control policies.
Azure SQL Database must enforce approved authorizations for logical access to server information and system resources in accordance with applicable access control policies.
Exchange must have authenticated access set to Integrated Windows Authentication only.
Exchange Servers must use approved DoD certificates.
Exchange ActiveSync (EAS) must only use certificate-based authentication to access email.
Exchange must have IIS map client certificates to an approved certificate server.
Exchange servers must use approved DoD certificates.
Office client polling of Sharepoint servers published links must be disabled.
Manually configured SCOM Run As accounts must be set to More Secure distribution.
SCOM Run As accounts used to manage Linux/UNIX endpoints must be configured for least privilege.
The Microsoft SCOM Agent Action Account must be a local system account.
The Microsoft SCOM Run As accounts must only use least access permissions.
The Microsoft SCOM administration console must only be installed on Management Servers and hardened Privileged Access Workstations.
The Microsoft SCOM Service Accounts and Run As accounts must not be granted enterprise or domain level administrative privileges.
SCOM SQL Management must be configured to use least privileges.
SQL Server must enforce approved authorizations for logical access to information and database-level system resources in accordance with applicable access control policies.
SQL Server must enforce approved authorizations for logical access to server-level system resources in accordance with applicable access control policies.
The network device must be configured to assign appropriate user roles or access levels to authenticated users.
ONTAP must enforce administrator privileges based on their defined roles.
Nutanix AOS must be configured with an encrypted boot password for root.
Nutanix AOS role mapping must be configured to the lowest privilege level needed for user access.
Access to Prisma Cloud Compute must be managed based on user need and least privileged using external identity providers for authentication and grouping to role-based assignments when possible.
Users requiring access to Prisma Cloud Compute's Credential Store must be assigned and accessed by the appropriate role holders.
The Riverbed NetProfiler must be configured to authenticate each administrator prior to authorizing privileges based on roles.
Rancher MCM must generate audit records for all DoD-defined auditable events within all components in the platform.
Riverbed Optimization System (RiOS) must enforce the assigned privilege level for each administrator and authorizations for access to all commands relative to the privilege level in accordance with applicable policy for the device.
Innoslate must enforce approved authorizations for logical access to information and system resources in accordance with applicable access control policies.
Symantec ProxySG must implement security policies that enforce approved authorizations for logical access to information and system resources by employing identity-based, role-based, and/or attribute-based security policies.
Tanium Computer Groups must be used to restrict console users from affecting changes to unauthorized computers.
Documentation identifying Tanium console users and their respective User Roles must be maintained.
Role-based system access must be configured to least privileged access to Tanium Server functions through the Tanium interface.
Tanium console users User Roles must be validated against the documentation for User Roles.
Documentation identifying Tanium console users and their respective Computer Group rights must be maintained.
Tanium console users Computer Group rights must be validated against the documentation for Computer Group rights.
The Tanium Action Approval feature must be enabled for two person integrity when deploying actions to endpoints.
Symantec ProxySG must be configured to enforce user authorization to implement least privilege.
Symantec ProxySG must configure Web Management Console access restrictions to authorized IP address/ranges.
Tanium Computer Groups must be used to restrict console users from effecting changes to unauthorized computers.
Documentation identifying Tanium console users, their respective User Groups, Computer Groups, and Roles must be maintained.
The Tanium application must be configured to use Tanium User Groups in a manner consistent with the model outlined in the environment's system documentation.
The Tanium Action Approval feature must be enabled for two-person integrity when deploying actions to endpoints.
Documentation identifying Tanium console users, their respective functional roles, and computer groups must be maintained.
Documentation defining Tanium functional roles must be maintained.
The Tanium application must be configured to use Tanium User Groups in a manner consistent with the model outlined within the environment's system documentation.
The TippingPoint SMS must be configured to use an authentication server for the purpose of authenticating users prior to granting administrative access and to enforce access restrictions.
The Horizon Connection Server administrators must be limited in terms of quantity, scope, and permissions.
Predefined task roles to the Hardware Management Console (HMC) must be specified to limit capabilities of individual users.
On Classified Systems, Logical Partition must be restricted with read/write access to only its own IOCDS.
Classified Logical Partition (LPAR) channel paths must be restricted.
On Classified Systems the Processor Resource/Systems Manager (PR/SM) must not allow access to system complex data.
Central processors must be restricted for classified/restricted Logical Partitions (LPARs).
The Apache web server must use cryptography to protect the integrity of remote sessions.
Default password for keystore must be changed.
Cookies must have secure flag set.
Cookies must have http-only flag set.
DefaultServlet must be set to readonly for PUT and DELETE.
Connectors must be secured.
The Java Security Manager must be enabled.
The BYOAD and DOD enterprise must be configured to limit access to only enterprise corporate-owned IT resources approved by the authorizing official (AO).
The iOS/iPadOS 16 BYOAD must be deployed in Device Enrollment mode or User Enrollment mode.
The macOS system must disable FileVault automatic log on.
The macOS system must enable SSH server for remote access sessions.
The macOS system must disable Server Message Block sharing.
The macOS system must disable Network File System service.
The macOS system must disable Unix-to-Unix Copy Protocol service.
The macOS system must disable the built-in web server.
The macOS system must disable AirDrop.
The macOS system must disable Remote Apple Events.
The macOS system must disable Trivial File Transfer Protocol service.
The macOS system must disable Screen Sharing and Apple Remote Desktop.
Ubuntu operating systems booted with United Extensible Firmware Interface (UEFI) implemented must require authentication upon booting into single-user mode and maintenance.
The macOS system must disable Media Sharing.
The macOS system must disable Bluetooth sharing.
The macOS system must ensure System Integrity Protection is enabled.
The macOS system must disable Handoff.
The macOS system must enable Authenticated Root.
Ubuntu operating systems when booted must require authentication upon booting into single-user and maintenance modes.
PostgreSQL must enforce approved authorizations for logical access to information and system resources in accordance with applicable access control policies.
The Cisco ISE must enforce approved access by employing authorization policies with specific attributes; such as resource groups, device type, certificate attributes, or any other attributes that are specific to a group of endpoints, and/or mission conditions as defined in the site's Cisco ISE System Security Plan (SSP). This is required for compliance with C2C Step 4.
The Cisco ISE must be configured to profile endpoints connecting to the network. This is required for compliance with C2C Step 4.
The Cisco ISE must verify host-based firewall software is running on posture required clients defined in the NAC System Security Plan (SSP) prior to granting trusted network access. This is required for compliance with C2C Step 4.
The Cisco ISE must verify anti-malware software is installed and up to date on posture required clients defined in the NAC System Security Plan (SSP) prior to granting trusted network access. This is required for compliance with C2C Step 4.
The Cisco ISE must verify host-based IDS/IPS software is authorized and running on posture required clients defined in the NAC System Security Plan (SSP) prior to granting trusted network access. This is required for compliance with C2C Step 4.
For endpoints that require automated remediation, the Cisco ISE must be configured to redirect endpoints to a logically separate VLAN for remediation services. This is required for compliance with C2C Step 4.
The Cisco ISE must be configured to notify the user before proceeding with remediation of the user's endpoint device when automated remediation is used. This is required for compliance with C2C Step 3.
The Cisco ISE must be configured so that all endpoints that are allowed to bypass policy assessment are approved by the Information System Security Manager (ISSM) and documented in the System Security Plan (SSP). This is This is required for compliance with C2C Step 1.
The Cisco ISE must send an alert to the Information System Security Manager (ISSM) and System Administrator (SA), at a minimum, when security issues are found that put the network at risk. This is required for compliance with C2C Step 2.
When endpoints fail the policy assessment, the Cisco ISE must create a record with sufficient detail suitable for forwarding to a remediation server for automated remediation or sending to the user for manual remediation. This is required for compliance with C2C Step 3.
The Cisco ISE must place client machines on the blacklist and terminate the agent connection when critical security issues are found that put the network at risk. This is required for compliance with C2C Step 4.
The Cisco ISE must be configured so client machines do not communicate with other network devices in the DMZ or subnet except as needed to perform an access client assessment or to identify themselves. This is required for compliance with C2C Step 2.
The DBMS must enforce approved authorizations for logical access to information and system resources in accordance with applicable access control policies.
Least privilege access and need to know must be required to access the container platform registry.
Least privilege access and need to know must be required to access the container platform runtime.
Least privilege access and need to know must be required to access the container platform keystore.
The EDB Postgres Advanced Server must enforce approved authorizations for logical access to information and system resources in accordance with applicable access control policies.
The Google Android 13 BYOAD and DOD enterprise must be configured to limit access to only AO-approved, corporate-owned enterprise IT resources.
The number of ACF2 users granted the special privilege PPGM must be justified.
The operating system must enforce approved authorizations for logical access to information and system resources in accordance with applicable access control policies.
AIX must turn on enhanced Role-Based Access Control (RBAC) to isolate security functions from nonsecurity functions, to grant system privileges to other operating system admins, and prohibit user installation of system software without explicit privileged status.
The number of ACF2 users granted the special privilege OPERATOR must be kept to a strictly controlled minimum.
The number of ACF2 users granted the special privilege CONSOLE must be justified.
The number of ACF2 users granted the special privilege ALLCMDS must be justified.
IBM z/OS system commands must be properly protected.
IBM z/OS Sensitive Utility Controls must be properly defined and protected.
CA-ACF2 NJE GSO record value must indicate validation options that apply to jobs submitted through a network job entry subsystem (JES2, JES3, RSCS).
CA-ACF2 must protect Memory and privileged program dumps in accordance with proper security requirements.
CA-ACF2 must properly define users that have access to the CONSOLE resource in the TSOAUTH resource class.
CA-ACF2 must limit access to SYSTEM DUMP data sets to appropriate authorized users.
CA-ACF2 must limit access to SYS(x).TRACE to system programmers only.
CA-ACF2 allocate access to system user catalogs must be properly protected.
ACF2 Classes required to properly security the z/OS UNIX environment must be ACTIVE.
Access to IBM z/OS special privilege TAPE-LBL or TAPE-BLP must be limited and/or justified.
CA-ACF2 must limit access to System page data sets (i.e., PLPA, COMMON, and LOCALx) to system programmers.
IBM z/OS must protect dynamic lists in accordance with proper security requirements.
IBM z/OS Libraries included in the system REXXLIB concatenation must be properly protected.
CA-ACF2 must limit Write or greater access to SYS1.UADS To system programmers only and read and update access must be limited to system programmer personnel and/or security personnel.
CA-ACF2 must limit all system PROCLIB data sets to appropriate authorized users.
CA-ACF2 access to the System Master Catalog must be properly protected.
IBM z/OS MCS consoles access authorization(s) for CONSOLE resource(s) must be properly protected.
CA-ACF2 must limit Write or greater access to SYS1.NUCLEUS to system programmers only.
CA-ACF2 must limit Write or greater access to SYS1.LPALIB to system programmers only.
CA-ACF2 must limit Write or greater access to SYS1.IMAGELIB to system programmers.
CA-ACF2 must limit Write or greater access to Libraries containing EXIT modules to system programmers only.
CA-ACF2 must limit Write and Allocate access to all APF-authorized libraries to system programmers only.
CA-ACF2 must limit Write or greater access to all LPA libraries to system programmers only.
CA-ACF2 must limit Write and Allocate access to LINKLIST libraries to system programmers only.
CA-ACF2 must limit Write and allocate access to all system-level product installation libraries to system programmers only.
CA-ACF2 must limit Write or greater access to SYS1.SVCLIB to system programmers only.
CA-ACF2 Access to SYS1.LINKLIB must be properly protected.
CA-ACF2 must limit access to data sets used to back up and/or dump SMF collection files to appropriate users and/or batch jobs that perform SMF dump processing.
IBM z/OS SYS1.PARMLIB must be properly protected.
CA-ACF2 must limit Write and allocate access to the JES2 System data sets (e.g., Spool, Checkpoint, and Initialization parameters) to system programmers only.
CA-ACF2 must limit Write or greater access to libraries that contain PPT modules to system programmers only.
CA-TSS Security control ACIDs must be limited to the administrative authorities authorized and that require these privileges to perform their job duties.
The number of CA-TSS ACIDs possessing the tape Bypass Label Processing (BLP) privilege must be limited.
IBM z/OS must limit access for SMF collection files (i.e., SYS1.MANx) to appropriate users and/or batch jobs that perform SMF dump processing.
CA-TSS access to SYS1.LINKLIB must be properly protected.
CA-TSS must limit Write or greater access to SYS1.SVCLIB to system programmers only.
CA-TSS must limit Write or greater access to SYS1.IMAGELIB to system programmers only.
CA-TSS must limit Write or greater access to SYS1.LPALIB to system programmers only.
CA-TSS must limit WRITE or greater access to all APF-authorized libraries to system programmers only.
IBM z/OS libraries included in the system REXXLIB concatenation must be properly protected.
CA-TSS must limit Write or greater access to all LPA libraries to system programmers only.
CA-TSS must limit Write or greater access to SYS1.NUCLEUS to system programmers only.
CA-TSS must limit Write or greater access to libraries that contain PPT modules to system programmers only.
CA-TSS must limit WRITE or greater access to LINKLIST libraries to system programmers only.
CA-TSS security data sets and/or databases must be properly protected.
CA-TSS must limit access to the System Master Catalog to appropriate authorized users.
CA-TSS allocate access to system user catalogs must be limited to system programmers only.
CA-TSS must limit WRITE or greater access to all system-level product installation libraries to system programmers only.
CA-TSS must limit WRITE or greater access to the JES2 System data sets (e.g., Spool, Checkpoint, and Initialization parameters) to system programmers only.
CA-TSS must limit Write or greater access to SYS1.UADS to system programmers only, and Read and Update access must be limited to system programmer personnel and/or security personnel.
CA-TSS must limit access to data sets used to back up and/or dump SMF collection files to appropriate users and/or batch jobs that perform SMF dump processing.
CA-TSS must limit access to SYSTEM DUMP data sets to system programmers only.
ACF2 security data sets and/or databases must be properly protected.
IBM z/OS data sets for the FTP Server must be properly protected.
IBM z/OS permission bits and user audit bits for HFS objects that are part of the FTP Server component must be properly configured.
IBM z/OS JESTRACE and/or SYSLOG resources must be protected in accordance with security requirements.
IBM z/OS JESSPOOL resources must be protected in accordance with security requirements.
IBM z/OS JESNEWS resources must be protected in accordance with security requirements.
IBM z/OS JES2 system commands must be protected in accordance with security requirements.
IBM z/OS JES2 spool resources must be controlled in accordance with security requirements.
IBM z/OS JES2 output devices must be properly controlled for Classified Systems.
IBM z/OS JES2 output devices must be controlled in accordance with the proper security requirements.
IBM z/OS JES2 input sources must be controlled in accordance with the proper security requirements.
IBM z/OS Surrogate users must be controlled in accordance with proper security requirements.
IBM z/OS special privileges must be assigned on an as-needed basis to LOGONIDs associated with STCs and LOGONIDs that need to execute TSO in batch.
IBM z/OS SMF collection files (i.e., SYS1.MANx) access must be limited to appropriate users and/or batch jobs that perform SMF dump processing.
IBM z/OS permission bits and user audit bits for HFS objects that are part of the Syslog daemon component must be configured properly.
IBM z/OS DFSMS resource class(es) must be defined to the GSO CLASMAP record in accordance with security requirements.
IBM z/OS DFSMS Program Resources must be properly defined and protected.
IBM z/OS DFSMS control data sets must be protected in accordance with security requirements.
IBM z/OS DFMSM resource class(es)must be defined to the GSO SAFDEF record in accordance with security requirements.
IBM z/OS DFSMS resources must be protected in accordance with the proper security requirements.
IBM z/OS TCP/IP resources must be properly protected.
IBM z/OS permission bits and user audit bits for HFS objects that are part of the Base TCP/IP component must be configured properly.
IBM z/OS data sets for the Base TCP/IP component must be properly protected.
IBM z/OS TSOAUTH resources must be restricted to authorized users.
IBM z/OS UNIX SUPERUSER resource must be protected in accordance with guidelines.
IBM z/OS UNIX security parameters in etc/profile must be properly specified.
IBM z/OS UNIX security parameters in /etc/rc must be properly specified.
IBM z/OS UNIX resources must be protected in accordance with security requirements.
IBM z/OS UNIX MVS HFS directory(s) with other write permission bit set must be properly defined.
IBM z/OS BPX resource(s) must be protected in accordance with security requirements.
IBM z/OS UNIX SYSTEM FILE SECURITY SETTINGS must be properly protected or specified.
IBM z/OS UNIX MVS data sets with z/OS UNIX components must be properly protected.
IBM z/OS UNIX MVS data sets or HFS objects must be properly protected.
IBM z/OS UNIX HFS permission bits and audit bits for each directory must be properly protected.
IBM z/OS UNIX MVS data sets used as step libraries in /etc/steplib must be properly protected.
IBM z/OS startup user account for the z/OS UNIX Telnet Server must be defined properly.
IBM z/OS HFS objects for the z/OS UNIX Telnet Server must be properly protected.
IBM z/OS System data sets used to support the VTAM network must be properly secured.
IBM Integrated Crypto Service Facility (ICSF) install data sets must be properly protected.
IBM RACF must limit Write or greater access to SYS1.NUCLEUS to system programmers only.
IBM RACF must limit Write or greater access to libraries that contain PPT modules to system programmers only.
IBM RACF must protect memory and privileged program dumps in accordance with proper security requirements.
IBM RACF must properly define users that have access to the CONSOLE resource in the TSOAUTH resource class.
The IBM RACF FACILITY resource class must be active.
The IBM RACF OPERCMDS resource class must be active.
The IBM RACF MCS consoles resource class must be active.
IBM RACF CLASSACT SETROPTS must be specified for the TEMPDSN class.
IBM RACF started tasks defined with the trusted attribute must be justified.
IBM RACF USERIDs possessing the Tape Bypass Label Processing (BLP) privilege must be justified.
IBM RACF DASD volume-level protection must be properly defined.
IBM Sensitive Utility Controls must be properly defined and protected.
IBM RACF Global Access Checking must be restricted to appropriate classes and resources.
IBM RACF access to the System Master Catalog must be properly protected.
IBM RACF must limit Write or greater access to SYS1.UADS to system programmers only, and WRITE or greater access must be limited to system programmer personnel and/or security personnel.
IBM RACF allocate access to system user catalogs must be properly protected.
IBM RACF must limit WRITE or greater access to System backup files to system programmers and/or batch jobs that perform DASD backups.
IBM RACF must limit access to SYS(x).TRACE to system programmers only.
IBM RACF batch jobs must be properly secured.
IBM RACF batch jobs must be protected with propagation control.
IBM RACF must limit Write or greater access to SYS1.IMAGELIB to system programmers only.
IBM RACF must limit Write or greater access to SYS1.SVCLIB to appropriate authorized users.
IBM RACF must limit Write or greater access to SYS1.LPALIB to system programmers only.
IBM RACF must limit write or greater access to all LPA libraries to system programmers only.
IBM RACF must limit Write or greater access to libraries containing EXIT modules to system programmers only.
IBM RACF must limit WRITE or greater access to all system-level product installation libraries to system programmers.
IBM RACF must limit access to SYSTEM DUMP data sets to system programmers only.
IBM RACF must limit WRITE or greater access to all APF-authorized libraries to system programmers only.
IBM RACF access to SYS1.LINKLIB must be properly protected.
The IBM RACF System REXX IRRPWREX security data set must be properly protected.
IBM RACF security data sets and/or databases must be properly protected.
IBM RACF must limit access to data sets used to back up and/or dump SMF collection files to appropriate users and/or batch jobs that perform SMF dump processing.
IBM RACF must limit all system PROCLIB data sets to system programmers only.
IBM RACF must limit access to System page data sets (i.e., PLPA, COMMON, and LOCALx) to system programmers.
IBM RACF must limit WRITE or greater access to the JES2 System data sets (e.g., Spool, Checkpoint, and Initialization parameters) to system programmers only.
CA-TSS WRITE or Greater access to System backup files must be limited to system programmers and/or batch jobs that perform DASD backups.
CA-TSS must limit access to SYS(x).TRACE to system programmers only.
CA-TSS must limit access to System page data sets (i.e., PLPA, COMMON, and LOCALx) to system programmers only.
CA-TSS must limit WRITE or greater access to libraries containing EXIT modules to system programmers only.
CA-TSS must limit all system PROCLIB data sets to system programmers only and appropriate authorized users.
CA-TSS must protect memory and privileged program dumps in accordance with proper security requirements.
CA-TSS must properly define users that have access to the CONSOLE resource in the TSOAUTH resource class.
IBM z/OS Operating system commands (MVS.) of the OPERCMDS resource class must be properly owned.
CA-TSS AUTH Control Option values specified must be set to (OVERRIDE,ALLOVER) or (MERGE,ALLOVER).
Access to the CA-TSS MODE resource class must be appropriate.
Data set masking characters must be properly defined to the CA-TSS security database.
CA-TSS Emergency ACIDs must be properly limited and must audit all resource access.
CA-TSS ACIDs must not have access to FAC(*ALL*).
The CA-TSS ALL record must have appropriate access to Facility Matrix Tables.
Data set masking characters allowing access to all data sets must be properly restricted in the CA-TSS security database.
IBM z/OS DASD Volume access greater than CREATE found in the CA-TSS database must be limited to authorized information technology personnel requiring access to perform their job duties.
CA-TSS permission bits and user audit bits for HFS objects that are part of the FTP server component must be properly configured.
IBM z/OS data sets for the FTP server must be properly protected.
IBM z/OS JES2.** resource must be properly protected in the CA-TSS database.
IBM z/OS RJE workstations and NJE nodes must be controlled in accordance with STIG requirements.
IBM z/OS JES2 input sources must be properly controlled.
IBM z/OS JES2 output devices must be properly controlled for classified systems.
IBM RACF DASD Management USERIDs must be properly controlled.
IBM RACF permission bits and user audit bits for HFS objects that are part of the FTP server component must be properly configured.
IBM z/OS RJE workstations and NJE nodes must be defined to the FACILITY resource class.
IBM z/OS surrogate users must be controlled in accordance with proper security requirements.
IBM Z/OS TSOAUTH resources must be restricted to authorized users.
IBM z/OS UNIX SUPERUSER resources must be protected in accordance with guidelines.
IBM z/OS permission bits and user audit bits for HFS objects that are part of the Syslog daemon component must be properly configured.
IBM z/OS DFSMS-related RACF classes must be active.
IBM z/OS permission bits and user audit bits for HFS objects that are part of the Base TCP/IP component must be properly configured.
The IBM RACF SERVAUTH resource class must be active for TCP/IP resources.
The IBM z/OS UNIX SUPERUSER resources must be protected in accordance with guidelines.
IBM z/OS UNIX MVS HFS directories with other write permission bit set must be properly defined.
IBM z/OS UNIX MVS data sets WITH z/OS UNIX COMPONENTS must be properly protected.
The IBM z/OS startup user account for the z/OS UNIX Telnet Server must be properly defined.
IBM z/OS System datasets used to support the VTAM network must be properly secured.
The IBM RACF System REXX IRRPHREX security data set must be properly protected.
IBM RACF must limit WRITE or greater access to LINKLIST libraries to system programmers only.
IBM z/OS UNIX system file security settings must be properly protected or specified.
IBM z/OS UNIX MVS HFS directory(s) with OTHER write permission bit set must be properly defined.
The CA-TSS HFSSEC resource class must be defined with DEFPROT.
The IBM z/OS startup user account for the z/OS UNIX Telnet server must be properly defined.
IBM z/OS HFS objects for the z/OS UNIX Telnet server must be properly protected.
IBM Integrated Crypto Service Facility (ICSF) install data sets are not properly protected.
The Juniper EX switch must be configured to assign appropriate user roles or access levels to authenticated users.
The ICS must be configured to prevent nonprivileged users from executing privileged functions.
The Kubernetes API Server must enable Node,RBAC as the authorization mode.
The Kubernetes Scheduler must have secure binding.
The Kubernetes Controller Manager must have secure binding.
The Kubernetes API server must have the insecure port flag disabled.
The Kubernetes Kubelet must have the "readOnlyPort" flag disabled.
The Kubernetes API server must have the insecure bind address not set.
The Kubernetes API server must have the secure port set.
The Kubernetes API server must have anonymous authentication disabled.
The Kubernetes Kubelet must have anonymous authentication disabled.
The Kubernetes kubelet must enable explicit authorization.
Kubernetes Worker Nodes must not have sshd service running.
Kubernetes Worker Nodes must not have the sshd service enabled.
Kubernetes dashboard must not be enabled.
Kubernetes Kubectl cp command must give expected access and results.
The Kubernetes kubelet staticPodPath must not enable static pods.
Kubernetes DynamicAuditing must not be enabled.
Kubernetes DynamicKubeletConfig must not be enabled.
The Kubernetes API server must have Alpha APIs disabled.
MarkLogic Server must enforce approved authorizations for logical access to information and system resources in accordance with applicable access control policies.
MariaDB must enforce approved authorizations for logical access to information and system resources in accordance with applicable access control policies.
MongoDB must enforce approved authorizations for logical access to information and system resources in accordance with applicable access control policies.
Exchange servers must use approved DOD certificates.
Exchange must have authenticated access set to integrated Windows authentication only.
Access to web administration tools must be restricted to the web manager and the web managers designees.
SQL Server must enforce approved authorizations for logical access to information and system resources in accordance with applicable access control policies.
Local volumes must be formatted using NTFS.
The SQL Server default account [sa] must be disabled.
The network device must enforce the assigned privilege level for each administrator and authorizations for access to all commands relative to the privilege level in accordance with applicable policy for the device.
The Access this computer from the network user right must only be assigned to the Administrators and Remote Desktop Users groups.
The Allow log on locally user right must only be assigned to the Administrators and Users groups.
The Deny access to this computer from the network user right on workstations must be configured to prevent access from highly privileged domain accounts and local accounts on domain systems and unauthenticated access on all systems.
The "Deny log on as a batch job" user right on domain-joined workstations must be configured to prevent access from highly privileged domain accounts.
The Deny log on as a service user right on Windows 10 domain-joined workstations must be configured to prevent access from highly privileged domain accounts.
The Deny log on locally user right on workstations must be configured to prevent access from highly privileged domain accounts on domain systems and unauthenticated access on all systems.
The Deny log on through Remote Desktop Services user right on Windows 10 workstations must at a minimum be configured to prevent access from highly privileged domain accounts and local accounts on domain systems and unauthenticated access on all systems.
The "Access this computer from the network" user right must only be assigned to the Administrators and Remote Desktop Users groups.
The "Allow log on locally" user right must only be assigned to the Administrators and Users groups.
The "Deny access to this computer from the network" user right on workstations must be configured to prevent access from highly privileged domain accounts and local accounts on domain systems and unauthenticated access on all systems.
The "Deny log on as a service" user right on Windows 11 domain-joined workstations must be configured to prevent access from highly privileged domain accounts.
The "Deny log on locally" user right on workstations must be configured to prevent access from highly privileged domain accounts on domain systems and unauthenticated access on all systems.
The "Deny log on through Remote Desktop Services" user right on Windows 11 workstations must be configured to prevent access from highly privileged domain accounts and local accounts on domain systems and unauthenticated access on all systems.
Local volumes must use a format that supports NTFS attributes.
Non-administrative accounts or groups must only have print permissions on printer shares.
The Access this computer from the network user right must only be assigned to the Administrators, Authenticated Users, and
Enterprise Domain Controllers groups on domain controllers.
The Allow log on through Remote Desktop Services user right must only be assigned to the Administrators group.
The Deny access to this computer from the network user right on domain controllers must be configured to prevent unauthenticated access.
The Deny log on as a batch job user right on domain controllers must be configured to prevent unauthenticated access.
The Deny log on as a service user right must be configured to include no accounts or groups (blank) on domain controllers.
The Deny log on locally user right on domain controllers must be configured to prevent unauthenticated access.
The "Access this computer from the network" user right must only be assigned to the Administrators and Authenticated Users groups on member servers.
The "Deny access to this computer from the network" user right on member servers must be configured to prevent access from highly privileged domain accounts and local accounts on domain systems and from unauthenticated access on all systems.
The "Deny log on as a batch job" user right on member servers must be configured to prevent access from highly privileged domain accounts on domain systems and from unauthenticated access on all systems.
The "Deny log on as a service" user right on member servers must be configured to prevent access from highly privileged domain accounts on domain systems. No other groups or accounts must be assigned this right.
The "Deny log on locally" user right on member servers must be configured to prevent access from highly privileged domain accounts on domain systems and from unauthenticated access on all systems.
The Allow log on locally user right must only be assigned to the Administrators group.
Windows Server 2019 local volumes must use a format that supports NTFS attributes.
Windows Server 2019 non-administrative accounts or groups must only have print permissions on printer shares.
Windows Server 2019 Access this computer from the network user right must only be assigned to the Administrators, Authenticated Users, and
Enterprise Domain Controllers groups on domain controllers.
Windows Server 2019 Allow log on through Remote Desktop Services user right must only be assigned to the Administrators group on domain controllers.
Windows Server 2019 Deny access to this computer from the network user right on domain controllers must be configured to prevent unauthenticated access.
Windows Server 2019 Deny log on as a batch job user right on domain controllers must be configured to prevent unauthenticated access.
Windows Server 2019 Deny log on as a service user right must be configured to include no accounts or groups (blank) on domain controllers.
Windows Server 2019 Deny log on locally user right on domain controllers must be configured to prevent unauthenticated access.
Windows Server 2019 "Access this computer from the network" user right must only be assigned to the Administrators and Authenticated Users groups on domain-joined member servers and standalone or nondomain-joined systems.
Windows Server 2019 "Deny access to this computer from the network" user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts and local accounts and from unauthenticated access on all systems.
Windows Server 2019 "Deny log on as a batch job" user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts and from unauthenticated access on all systems.
Windows Server 2019 "Deny log on as a service" user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts. No other groups or accounts must be assigned this right.
Windows Server 2019 "Deny log on locally" user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts and from unauthenticated access on all systems.
Windows Server 2019 Allow log on locally user right must only be assigned to the Administrators group.
Windows Server 2022 local volumes must use a format that supports NTFS attributes.
Windows Server 2022 nonadministrative accounts or groups must only have print permissions on printer shares.
Windows Server 2022 Access this computer from the network user right must only be assigned to the Administrators, Authenticated Users, and
Enterprise Domain Controllers groups on domain controllers.
Windows Server 2022 Allow log on through Remote Desktop Services user right must only be assigned to the Administrators group on domain controllers.
Windows Server 2022 Deny access to this computer from the network user right on domain controllers must be configured to prevent unauthenticated access.
Windows Server 2022 Deny log on as a batch job user right on domain controllers must be configured to prevent unauthenticated access.
Windows Server 2022 Deny log on as a service user right must be configured to include no accounts or groups (blank) on domain controllers.
Windows Server 2022 Deny log on locally user right on domain controllers must be configured to prevent unauthenticated access.
Windows Server 2022 Access this computer from the network user right must only be assigned to the Administrators and Authenticated Users groups on domain-joined member servers and standalone or nondomain-joined systems.
Windows Server 2022 Deny access to this computer from the network user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts and local accounts and from unauthenticated access on all systems.
Windows Server 2022 Deny log on as a batch job user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts and from unauthenticated access on all systems.
Windows Server 2022 Deny log on as a service user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts. No other groups or accounts must be assigned this right.
Windows Server 2022 Deny log on locally user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts and from unauthenticated access on all systems.
Windows Server 2022 Allow log on locally user right must only be assigned to the Administrators group.
The DBMS must enforce approved authorizations for logical access to the system in accordance with applicable policy.
The DBMS must restrict grants to sensitive information to authorized user roles.
The DBMS must enforce approved authorizations for logical access to the system in accordance with applicable policy.
The Oracle Linux operating system must require authentication upon booting into single-user and maintenance modes.
Oracle Linux operating systems version 7.2 or newer with a Basic Input/Output System (BIOS) must require authentication upon booting into single-user and maintenance modes.
Oracle Linux operating systems version 7.2 or newer using Unified Extensible Firmware Interface (UEFI) must require authentication upon booting into single-user and maintenance modes.
Oracle Linux operating systems version 7.2 or newer booted with a BIOS must have a unique name for the grub superusers account when booting into single-user and maintenance modes.
Oracle Linux operating systems version 7.2 or newer booted with United Extensible Firmware Interface (UEFI) must have a unique name for the grub superusers account when booting into single-user mode and maintenance.
OL 8 operating systems booted with United Extensible Firmware Interface (UEFI) must require authentication upon booting into single-user mode and maintenance.
OL 8 operating systems booted with United Extensible Firmware Interface (UEFI) must have a unique name for the grub superusers account when booting into single-user mode and maintenance.
OL 8 operating systems booted with a BIOS must have a unique name for the grub superusers account when booting into single-user and maintenance modes.
OL 8 operating systems booted with a BIOS must require authentication upon booting into single-user and maintenance modes.
OL 8 operating systems must require authentication upon booting into rescue mode.
OL 8 operating systems must require authentication upon booting into emergency mode.
The MySQL Database Server 8.0 must enforce approved authorizations for logical access to information and system resources in accordance with applicable access control policies.
Redis Enterprise DBMS must enforce approved authorizations for logical access to information and system resources in accordance with applicable access control policies.
The Kubernetes Kubelet must have anonymous authentication disabled.
The Kubernetes Kubelet must have the read-only port flag disabled.
OpenShift RBAC access controls must be enforced.
RHEL 8 operating systems booted with United Extensible Firmware Interface (UEFI) must require authentication upon booting into single-user mode and maintenance.
RHEL 8 operating systems booted with a BIOS must require authentication upon booting into single-user and maintenance modes.
RHEL 8 operating systems must require authentication upon booting into rescue mode.
The Red Hat Enterprise Linux operating system must require authentication upon booting into single-user and maintenance modes.
Red Hat Enterprise Linux operating systems version 7.2 or newer with a Basic Input/Output System (BIOS) must require authentication upon booting into single-user and maintenance modes.
Red Hat Enterprise Linux operating systems version 7.2 or newer using Unified Extensible Firmware Interface (UEFI) must require authentication upon booting into single-user and maintenance modes.
Red Hat Enterprise Linux operating systems version 7.2 or newer booted with a BIOS must have a unique name for the grub superusers account when booting into single-user and maintenance modes.
Red Hat Enterprise Linux operating systems version 7.2 or newer booted with United Extensible Firmware Interface (UEFI) must have a unique name for the grub superusers account when booting into single-user mode and maintenance.
SUSE operating systems with a basic input/output system (BIOS) must require authentication upon booting into single-user and maintenance modes.
SUSE operating systems with Unified Extensible Firmware Interface (UEFI) implemented must require authentication upon booting into single-user mode and maintenance.
RHEL 8 operating systems booted with United Extensible Firmware Interface (UEFI) must require a unique superusers name upon booting into single-user mode and maintenance.
RHEL 8 operating systems booted with a BIOS must require a unique superusers name upon booting into single-user and maintenance modes.
RHEL 8 operating systems must require authentication upon booting into emergency mode.
RHEL 9 must require a boot loader superuser password.
RHEL 9 must require a unique superusers name upon booting into single-user and maintenance modes.
SUSE operating systems with a basic input/output system (BIOS) must require authentication upon booting into single-user and maintenance modes.
SUSE operating systems with Unified Extensible Firmware Interface (UEFI) implemented must require authentication upon booting into single-user mode and maintenance.
RHEL 9 must require authentication to access emergency mode.
RHEL 9 must require authentication to access single-user mode.
The VMM must enforce approved authorizations for logical access to information and system resources in accordance with applicable access control policies.
The Photon operating system must require authentication upon booting into single-user and maintenance modes.
The vCenter ESX Agent Manager service cookies must have secure flag set.
The vCenter ESX Agent Manager service cookies must have the "http-only" flag set.
The vCenter ESX Agent Manager service DefaultServlet must be set to "readonly" for "PUT" and "DELETE" commands.
The vCenter Lookup service cookies must have secure flag set.
The vCenter Lookup service cookies must have "http-only" flag set.
The vCenter Lookup service DefaultServlet must be set to "readonly" for "PUT" and "DELETE" commands.
The vCenter Perfcharts service cookies must have secure flag set.
The vCenter Perfcharts service cookies must have "http-only" flag set.
The vCenter Perfcharts service DefaultServlet must be set to "readonly" for "PUT" and "DELETE" commands.
The Photon operating system must require authentication upon booting into single-user and maintenance modes.
BMC CONTROL-D installation data sets will be properly protected.
BMC CONTROL-D user data sets must be properly protected.
BMC CONTROL-M/Restart installation data sets will be properly protected.
BMC CONTROL-M/Restart Archived Sysout data sets must be properly protected.
BMC CONTROL-O installation data sets will be properly protected.
BMC IOA installation data sets will be properly protected.
BMC IOA User data sets will be properly protected.
BMC MAINVIEW for z/OS installation data sets are not properly protected.
CA Common Services installation data sets will be properly protected.
Catalog Solution Install data sets are not properly protected.
BMC CONTROL-M installation data sets will be properly protected.
BMC CONTROL-M User data sets will be properly protected.
BMC CONTROL-M/Restart installation data sets will be not properly protected.
The vCenter STS service cookies must have secure flag set.
The vCenter STS service cookies must have "http-only" flag set.
The vCenter STS service DefaultServlet must be set to "readonly" for "PUT" and "DELETE" commands.
The vCenter UI service cookies must have secure flag set.
The vCenter UI service cookies must have "http-only" flag set.
The vCenter UI service DefaultServlet must be set to "readonly" for "PUT" and "DELETE" commands.
The web server must enforce approved authorizations for logical access to hosted applications and resources in accordance with applicable access control policies.
BMC CONTROL-M security exits are not installed or configured properly.
BMC CONTROL-M configuration/parameter values must be specified properly.
CA 1 Tape Management installation data sets must be properly protected.
CA MICS Resource Management installation data sets must be properly protected.
CA MICS Resource Management User data sets must be properly protected.
CA MIM Resource Sharing installation data sets will be properly protected.
CL/SuperSession Install data sets must be properly protected.
Compuware Abend-AID installation data sets will be properly protected.
Compuware Abend-AID user data sets must be properly protected.
Fast Dump Restore (FDR) install data sets are not properly protected.
A password control is not in place to restrict access to the service subsystem via the operator consoles (local and/or remote) and a key-lock switch is not used to protect the modem supporting the remote console of the service subsystem.
Sensitive CICS transactions are not protected in accordance with security requirements.
IBM System Display and Search Facility (SDSF) installation data sets will be properly protected.
IBM System Display and Search Facility (SDSF) HASPINDX data set identified in the INDEX parameter must be properly protected.
CA VTAPE installation data sets are not properly protected.
Quest NC-Pass installation data sets will be properly protected.
Transparent Data Migration Facility (TDMF) installation data sets will be not properly protected.
HFS objects for the WebSphere Application Server are not protected in accordance with the proper security requirements.
The CBIND Resource(s) for the WebSphere Application Server is(are) not protected in accordance with security requirements.
WebSphere MQ all update and alter access to MQSeries/WebSphere MQ product and system data sets are not properly restricted.
WebSphere MQ resource classes are not properly activated.
Websphere MQ switch profiles must be properly defined to the MQADMIN class.
WebSphere MQ MQCONN Class resources must be protected in accordance with security.
WebSphere MQ queue resource defined to the MQQUEUE resource class are not protected in accordance with security requirements.
WebSphere MQ Process resources are not protected in accordance with security requirements.
WebSphere MQ Namelist resources are not protected in accordance with security requirements.
WebSphere MQ alternate user resources defined to MQADMIN resource class are not protected in accordance with security requirements.
WebSphere MQ context resources defined to the MQADMIN resource class are not protected in accordance with security requirements.
WebSphere MQ command resources defined to MQCMDS resource class are not protected in accordance with security requirements.
WebSphere MQ RESLEVEL resources in the MQADMIN resource class are not protected in accordance with security requirements.
NetView install data sets are not properly protected.
Catalog Solutions Install data sets are not properly protected.
SRRAUDIT installation data sets must be properly protected.
ROSCOE Install data sets are not properly protected.
External RACF Classes are not active for CICS transaction checking.
CICS regions are improperly protected to prevent unauthorized propagation of the region userid.
Tivoli Asset Discovery for z/OS (TADz) Install data sets are not properly protected.
Vanguard Security Solutions (VSS) User data sets are not properly protected.
The CBIND Resource Class for the WebSphere Application Server is not configured in accordance with security requirements.
WebSphere MQ resource classes are not properly actived for security checking by the ACP.
WebSphere MQ switch profiles must be properly defined to the MQADMIN class.
WebSphere MQ MQCONN Class (Connection) resource definitions must be protected in accordance with security.
WebSphere MQ MQQUEUE (Queue) resource profiles defined to the MQQUEUE class are not protected in accordance with security requirements.
WebSphere MQ Process resource profiles defined in the MQPROC Class are not protected in accordance with security requirements.
WebSphere MQ Namelist resource profiles defined in the MQNLIST Class are not protected in accordance with security requirements.
WebSphere MQ Alternate User resources defined to MQADMIN resource class are not protected in accordance with security requirements.
WebSphere MQ RESLEVEL resources in the MQADMIN resource class are not protected in accordance with security requirements.
CICS userids are not defined and/or controlled in accordance with proper security requirements.
The BIG-IP APM module must enforce approved authorizations for logical access to information and system resources by employing identity-based, role-based, and/or attribute-based security policies.
WebSphere MQ security class(es) is(are) defined improperly.
Websphere MQ switch profiles must be properly defined to the MQADMIN class.
WebSphere MQ MQCONN Class resources must be protected properly.
The F5 BIG-IP appliance must enforce approved authorizations for logical access to resources by explicitly configuring assigned resources with an authorization list.
The BIG-IP appliance must be configured to enforce the assigned privilege level for each administrator and authorizations for access to all commands relative to the privilege level in accordance with applicable policy for the device.
The BIG-IP Core implementation must be configured to enforce approved authorizations for logical access to information and system resources by employing identity-based, role-based, and/or attribute-based security policies.
The BYOAD and DOD enterprise must be configured to limit access to only enterprise IT resources approved by the authorizing official (AO).
The iOS/iPadOS 17 BYOAD must be deployed in Device Enrollment mode or User Enrollment mode.
The macOS system must disable FileVault automatic login.
The macOS system must disable Server Message Block (SMB) sharing.
The macOS system must disable Network File System (NFS) service.
The macOS system must disable Unix-to-Unix Copy Protocol (UUCP) service.
The macOS system must disable Trivial File Transfer Protocol (TFTP) service.
The macOS system must disable Bluetooth Sharing.
Ubuntu 22.04 LTS, when booted, must require authentication upon booting into single-user and maintenance modes.
The Central Log Server must be configured to enforce approved authorizations for logical access to information and system resources in accordance with applicable access control policies.
The Cisco ISE must deny or restrict access for endpoints that fail required posture checks. This is required for compliance with C2C Step 4.
The Enterprise Voice, Video, and Messaging Endpoint must be configured to prevent the configuration or display of configuration settings without the use of a PIN or password.
The Enterprise Voice, Video, and Messaging Endpoint must be configured to register with an Enterprise Voice, Video, and Messaging Session Manager.
The F5 BIG-IP appliance providing user access control intermediary services must enforce approved authorizations for logical access to information and system resources by employing identity-based, role-based, and/or attribute-based security policies.
The Enterprise Voice, Video, and Messaging Session Manager must disable (prevent) auto-registration of Voice Video Endpoints.
The F5 BIG-IP appliance must be configured to assign appropriate user roles or access levels to authenticated users.
For endpoints that require automated remediation, Forescout must be configured to logically separate endpoints from the trusted network traffic during remediation. This is required for compliance with C2C Step 4.
Forescout must enforce the revocation of endpoint access authorizations when devices are removed from an authorization group. This is required for compliance with C2C Step 4.
Forescout must enforce the revocation of endpoint access authorizations at the next compliance assessment interval based on changes to the compliance assessment security policy. This is required for compliance with C2C Step 4.
Forescout must deny or restrict access for endpoints that fail critical endpoint security checks. This is required for compliance with C2C Step 4.
The Google Android 14 BYOAD and DOD enterprise must be configured to limit access to only AO-approved, corporate-owned enterprise IT resources.
Processor Resource/Systems Manager (PR/SM) must not allow unrestricted issuing of control program commands.
Least privilege access and need to know must be required to access MKE runtime and instantiate container images.
SSH must not run within Linux containers.
Swarm Secrets or Kubernetes Secrets must be used.
Access to Prisma Cloud Compute must be managed based on user need and least privileged using external identity providers for authentication and grouping to role-based assignments when possible.
The SDN controller must be configured to enforce approved authorizations for access to system resources in accordance with applicable access control policies.
SLEM 5 with a basic input/output system (BIOS) must require authentication upon booting into single-user and maintenance modes.
SLEM 5 with Unified Extensible Firmware Interface (UEFI) implemented must require authentication upon booting into single-user mode and maintenance.
The Samsung Android 14 BYOAD and DOD enterprise must be configured to limit access to only AO-approved, corporate-owned enterprise IT resources.
TOSS must require authentication upon booting into emergency or rescue modes.
The NSX Manager must assign users/accounts to organization-defined roles configured with approved authorizations.