Verify File Hashes with RPM
Install the Host Intrusion Prevention System (HIPS) Module
Configure AIDE to Use FIPS 140-2 for Validating Hashes
Configure AIDE to Verify Access Control Lists (ACLs)
Configure AIDE to Verify Extended Attributes
Ensure /home Located On Separate Partition
Ensure /tmp Located On Separate Partition
Ensure /var Located On Separate Partition
Ensure /var/log Located On Separate Partition
Ensure /var/log/audit Located On Separate Partition
The Installed Operating System Is Vendor Supported
Install Virus Scanning Software
Install McAfee Virus Scanning Software
Ensure Software Patches Installed
Virus Scanning Software Definitions Are Updated
Install McAfee Endpoint Security for Linux (ENSL)
Ensure McAfee Endpoint Security for Linux (ENSL) is running
Install the Asset Configuration Compliance Module (ACCM)
Install the Policy Auditor (PA) Module
Ensure PAM Enforces Password Requirements - Authentication Retry Prompts Permitted Per-Session
Disable the GNOME3 Login Restart and Shutdown Buttons
Disable GDM Automatic Login
Disable GNOME3 Automounting
Disable GNOME3 Automount Opening
Disable GNOME3 Automount running
Require Encryption for Remote Access in GNOME3
Prevent Login to Accounts With Empty Password
Ensure There Are No Accounts With Blank or Null Passwords
Disable Ctrl-Alt-Del Reboot Key Sequence in GNOME3
Verify Only Root Has UID 0
Ensure that System Accounts Do Not Run a Shell Upon Login
The operating system must restrict privilege elevation to authorized personnel
Ensure sudo only includes the default configuration directory
Ensure invoking users password for privilege escalation when using sudo
Install rng-tools Package
Ensure the Logon Failure Delay is Set Correctly in login.defs
All Interactive User Home Directories Must Be Group-Owned By The Primary Group
All Interactive User Home Directories Must Be Owned By The Primary User
Uninstall gssproxy Package
Uninstall iprutils Package
Ensure that Root's Path Does Not Include World or Group-Writable Directories
Ensure that Root's Path Does Not Include Relative Paths or Null Directories
Ensure the Default Bash Umask is Set Correctly
Ensure the Default Umask is Set Correctly in login.defs
Ensure the Default Umask is Set Correctly in /etc/profile
Install pam_pwquality Package
Ensure PAM password complexity module is enabled in password-auth
Ensure PAM password complexity module is enabled in system-auth
Disable debug-shell SystemD Service
Disable Ctrl-Alt-Del Burst Action
Disable Ctrl-Alt-Del Reboot Activation
Only Authorized Local User Accounts Exist on Operating System
Ensure auditd Collects File Deletion Events by User
Ensure auditd Collects File Deletion Events by User - rename
Ensure auditd Collects File Deletion Events by User - renameat
Ensure auditd Collects File Deletion Events by User - rmdir
Ensure auditd Collects File Deletion Events by User - unlink
Ensure auditd Collects File Deletion Events by User - unlinkat
Ensure Home Directories are Created for New Users
User Initialization Files Must Be Group-Owned By The Primary Group
User Initialization Files Must Not Run World-Writable Programs
User Initialization Files Must Be Owned By the Primary User
Ensure that Users Path Contains Only Local Directories
All Interactive Users Must Have A Home Directory Defined
All Interactive Users Home Directories Must Exist
All User Files and Directories In The Home Directory Must Be Group-Owned By The Primary Group
All User Files and Directories In The Home Directory Must Have a Valid Owner
All User Files and Directories In The Home Directory Must Have Mode 0750 Or Less Permissive
Ensure All User Initialization Files Have Mode 0740 Or Less Permissive
All Interactive User Home Directories Must Have mode 0750 Or Less Permissive
Ensure the Default C Shell Umask is Set Correctly
Ensure the Default Umask is Set Correctly For Interactive Users
Include Local Events in Audit Logs
Resolve information before writing to audit logs
Ensure rsyslog is Installed
Ensure logrotate is Installed
Ensure Logrotate Runs Periodically
Ensure Logs Sent To Remote Host
Configure Accepting Router Advertisements on All IPv6 Interfaces
Disable Accepting ICMP Redirects for All IPv6 Interfaces
Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv6 Interfaces
Disable Kernel Parameter for IPv6 Forwarding
Disable Accepting Router Advertisements on all IPv6 Interfaces by Default
Disable Kernel Parameter for Accepting ICMP Redirects by Default on IPv6 Interfaces
Disable Kernel Parameter for Accepting Source-Routed Packets on IPv6 Interfaces by Default
Disable Accepting ICMP Redirects for All IPv4 Interfaces
Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv4 Interfaces
Enable Kernel Parameter to Use Reverse Path Filtering on all IPv4 Interfaces
Disable Kernel Parameter for Accepting ICMP Redirects by Default on IPv4 Interfaces
Disable Kernel Parameter for Accepting Source-Routed Packets on IPv4 Interfaces by Default
Enable Kernel Parameter to Use Reverse Path Filtering on all IPv4 Interfaces by Default
Enable Kernel Parameter to Ignore ICMP Broadcast Echo Requests on IPv4 Interfaces
Enable Kernel Parameter to Use TCP Syncookies on Network Interfaces
Disable Kernel Parameter for Sending ICMP Redirects on all IPv4 Interfaces
Disable Kernel Parameter for Sending ICMP Redirects on all IPv4 Interfaces by Default
Disable Kernel Parameter for IP Forwarding on IPv4 Interfaces
Ensure All Files Are Owned by a Group
Disable core dump backtraces
Disable storing core dump
Disable Core Dumps for All Users
Restrict Exposed Kernel Pointer Addresses Access
Enable Randomized Layout of Virtual Address Space
Disable Avahi Server Software
Verify Group Who Owns /etc/cron.allow file
Verify User Who Owns /etc/cron.allow file
fapolicyd Must be Configured to Limit Access to Users Home Folders
Configure System to Forward All Mail For The Root Account
Verify Permissions on SSH Server Private *_key Key Files
Verify Permissions on SSH Server Public *.pub Key Files
Disable Host-Based Authentication
Allow Only SSH Protocol 2
Disable Compression Or Set Compression to delayed
Disable SSH Access via Empty Passwords
Disable GSSAPI Authentication
Disable Kerberos Authentication
Disable SSH Support for .rhosts Files
Ensure rsyslog-gnutls is installed
Disable SSH Support for Rhosts RSA Authentication
Disable SSH Support for User Known Hosts
Do Not Allow SSH Environment Options
Enable Use of Strict Mode Checking
Ensure cron Is Logging To Rsyslog
Enable Encrypted X11 Forwarding
Enable Use of Privilege Separation
Ensure rsyslog Does Not Accept Remote Messages Unless Acting As Log Server
Configure Multiple DNS Servers in /etc/resolv.conf
Disable Client Dynamic DNS Updates
Ensure System is Not Acting as a Network Sniffer
Set Default firewalld Zone for Incoming Packets
Manually Assign IPv6 Router Address
Use Privacy Extensions for Address
Manually Assign Global IPv6 Address
Disable Kernel Parameter for IPv4 Forwarding on all IPv4 Interfaces
Ensure All World-Writable Directories Are Owned by root User
Ensure All World-Writable Directories Are Owned by a System Account
Ensure All World-Writable Directories Are Group Owned by a System Account
Ensure All Files Are Owned by a User
Disable Modprobe Loading of USB Storage Driver
Add nosuid Option to /boot
Add noexec Option to /home
Add nosuid Option to /home
Add nodev Option to Non-Root Local Partitions
Add nodev Option to Removable Media Partitions
Add noexec Option to Removable Media Partitions
Add nosuid Option to Removable Media Partitions
Restrict usage of ptrace to descendant processes
Ensure No Device Files are Unlabeled by SELinux
Uninstall avahi-autoipd Server Package
Uninstall avahi Server Package
Disable KDump Kernel Crash Analyzer (kdump)
Disable DHCP Client in ifcfg
Uninstall DHCP Server Package
Uninstall openldap-servers Package
Prevent Unrestricted Mail Relaying
Mount Remote Filesystems with Kerberos Security
Mount Remote Filesystems with nodev
Mount Remote Filesystems with noexec
Mount Remote Filesystems with nosuid
Use Kerberos Security on All Exports
Install tcp_wrappers Package
Remove Host-Based Authentication Files
Remove User Host-Based Authentication Files
Uninstall tftp-server Package
Ensure tftp Daemon Uses Secure Mode
Ensure Default SNMP Password Is Not Used
Use Only FIPS 140-2 Validated Ciphers
Prevent remote hosts from connecting to the proxy display
Remove the X Windows Package Group
Disable graphical user interface
Disable X Windows Startup By Setting Default Target
Ensure PAM Enforces Password Requirements - Prevent the Use of Dictionary Words
Ensure PAM Enforces Password Requirements - Enforce for root User
Add nosuid Option to /boot/efi
Disable storing core dumps
Disable Access to Network bpf() Syscall From Unprivileged Processes
Harden the operation of the BPF just-in-time compiler
Disable the use of user namespaces
Disable acquiring, saving, and processing core dumps
Enable the Hardware RNG Entropy Gatherer Service
SSH server uses strong entropy to seed
Grant Or Deny System Access To Specific Hosts And Services
System Must Avoid Meltdown and Spectre Exploit Vulnerabilities in Modern Processors
Disable GDM Unattended or Automatic Login
The PAM configuration should not be changed automatically
Enforce Delay After Failed Logon Attempts
Remove Default Configuration to Disable Syscall Auditing
Ensure PAM Enforces Password Requirements - Enforcing
Disable Kernel Parameter for IPv6 Forwarding by default
Uninstall DHCP Client Package
The A10 Networks ADC, when used for load balancing web servers, must deploy the WAF in active mode.
If the Data Owner requires it, the A10 Networks ADC must be configured to perform CCN Mask, SSN Mask, and PCRE Mask Request checks.
The A10 Networks ADC must protect against TCP SYN floods by using TCP SYN Cookies.
The A10 Networks ADC must be a FIPS-compliant version.
The A10 Networks ADC must be configured to synchronize internal information system clocks with the primary and secondary time sources located in different geographic regions using redundant authoritative time sources.
The A10 Networks ADC must use DoD-approved PKI rather than proprietary or self-signed device certificates.
The A10 Networks ADC must use automated mechanisms to alert security personnel to threats identified by authoritative sources (e.g., CTOs) and IAW CJCSM 6510.01B.
The A10 Networks ADC must employ centrally managed authentication server(s).
AAA Services must be configured to use at least two NTP servers to synchronize time.
AAA Services must be configured to authenticate all NTP messages received from NTP servers and peers.
AAA Services must be configured to use their loopback or OOB management interface address as the source address when originating NTP traffic.
AAA Services used for 802.1x must be configured to use secure Extensible Authentication Protocol (EAP), such as EAP-TLS, EAP-TTLS, and PEAP.
AAA Services must not be configured with shared accounts.
AAA Services used to authenticate privileged users for device management must be configured to connect to the management network.
AAA Services must be configured to use a unique shared secret for communication (i.e. RADIUS, TACACS+) with clients requesting authentication services.
AAA Services must be configured to use IP segments separate from production VLAN IP segments.
AAA Services must be configured to place non-authenticated network access requests in the Unauthorized VLAN or the Guest VLAN with limited access.
AAA Services must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.
Membership to the Enterprise Admins group must be restricted to accounts used only to manage the Active Directory Forest.
Membership to the Domain Admins group must be restricted to accounts used only to manage the Active Directory domain and domain controllers.
Administrators must have separate accounts specifically for managing domain member servers.
Administrators must have separate accounts specifically for managing domain workstations.
Delegation of privileged accounts must be prohibited.
Separate smart cards must be used for Enterprise Admin (EA) and Domain Admin (DA) accounts from smart cards used for other accounts.
Separate domain accounts must be used to manage public facing servers from any domain accounts used to manage internal servers.
Domain controllers must be blocked from Internet access.
User accounts with domain level administrative privileges must be members of the Protected Users group in domains with a domain functional level of Windows 2012 R2 or higher.
Domain-joined systems (excluding domain controllers) must not be configured for unconstrained delegation.
The Directory Service Restore Mode (DSRM) password must be changed at least annually.
The domain functional level must be at a Windows Server version still supported by Microsoft.
Access to need-to-know information must be restricted to an authorized community of interest.
Interconnections between DoD directory services of different classification levels must use a cross-domain solution that is approved for use with inter-classification trusts.
A controlled interface must have interconnections among DoD information systems operating between DoD and non-DoD systems or networks.
Membership in the Group Policy Creator Owners and Incoming Forest Trust Builders groups must be limited.
User accounts with delegated authority must be removed from Windows built-in administrative groups or remove the delegated authority from the accounts.
Read-only Domain Controller (RODC) architecture and configuration must comply with directory services requirements.
Usage of administrative accounts must be monitored for suspicious and anomalous activity.
Systems must be monitored for attempts to use local accounts to log on remotely from other systems.
Systems must be monitored for remote desktop logons.
Active Directory data must be backed up daily for systems with a Risk Management Framework categorization for Availability of moderate or high. Systems with a categorization of low must be backed up weekly.
Each cross-directory authentication configuration must be documented.
Accounts from outside directories that are not part of the same organization or are not subject to the same security policies must be removed from all highly privileged groups.
Inter-site replication must be enabled and configured to occur at least daily.
Active Directory implementation information must be added to the organization contingency plan where the Risk Management Framework categorization for Availability is moderate or high.
Active Directory must be supported by multiple domain controllers where the Risk Management Framework categorization for Availability is moderate or high.
The impact of INFOCON changes on the cross-directory authentication configuration must be considered and procedures documented.
Changes to the AD schema must be subject to a documented configuration management process.
Anonymous Access to AD forest data above the rootDSE level must be disabled.
Membership to the Schema Admins group must be limited.
Kona Site Defender that provides intermediary services for HTTP must inspect inbound and outbound HTTP traffic for protocol compliance and protocol anomalies.
Upon successful login, the Akamai Luna Portal must notify the administrator of the date and time of the last login.
The Akamai Luna Portal must notify the administrator of the number of successful login attempts.
The Akamai Luna Portal must employ Security Assertion Markup Language (SAML) to automate central management of administrators.
The Akamai Luna Portal must employ Single Sign On (SSO) with Security Assertion Markup Language (SAML) integration to verify authentication settings.
System logging must be enabled.
The Apache web server must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.
All accounts installed with the Apache web server software and tools must have passwords assigned and default passwords changed.
The Apache web server software must be a vendor-supported version.
The Apache web server must alert the ISSO and SA (at a minimum) in the event of an audit processing failure.
Apple iOS/iPadOS 15 must [selection: wipe protected data, wipe sensitive data] upon unenrollment from MDM.
Apple iOS/iPadOS 15 must [selection: remove Enterprise application, remove all noncore applications (any nonfactory-installed application)] upon unenrollment from MDM.
Apple iOS/iPadOS 15 must be configured to not allow passwords that include more than two repeating or sequential characters.
Apple iOS/iPadOS 15 must be configured to enforce an application installation policy by specifying one or more authorized application repositories, including [selection: DoD-approved commercial app repository, MDM server, mobile application store].
Apple iOS/iPadOS 15 must not include applications with the following characteristics: access to Siri when the device is locked.
Apple iOS/iPadOS 15 allow list must be configured to not include applications with the following characteristics: voice dialing application if available when MD is locked.
Apple iOS/iPadOS 15 allowlist must be configured to not include applications with the following characteristics: - back up MD data to non-DoD cloud servers (including user and application access to cloud backup services);- transmit MD diagnostic data to non-DoD servers; - allows synchronization of data or applications between devices associated with user; and - allows unencrypted (or encrypted but not FIPS 140-2 validated) data sharing with other MDs or printers.
Apple iOS/iPadOS 15 must be configured to disable multiuser modes.
Apple iOS/iPadOS 15 must be configured to [selection: wipe protected data, wipe sensitive data] upon unenrollment from MDM.
Apple iOS/iPadOS 15 must be configured to [selection: remove Enterprise applications, remove all noncore applications (any nonfactory installed application)] upon unenrollment from MDM.
Apple iOS/iPadOS 15 must require a valid password be successfully entered before the mobile device data is unencrypted.
Apple iOS/iPadOS 15 must implement the management setting: limit Ad Tracking.
Apple iOS/iPadOS 15 must implement the management setting: not allow automatic completion of Safari browser passcodes.
Apple iOS/iPadOS 15 must implement the management setting: Encrypt iTunes backups/Encrypt local backup.
Apple iOS/iPadOS 15 must implement the management setting: not allow use of Handoff.
Apple iOS/iPadOS 15 must implement the management setting: require the user to enter a password when connecting to an AirPlay-enabled device for the first time.
Apple iOS/iPadOS 15 must implement the management setting: Disable Allow MailDrop.
Apple iOS/iPadOS 15 must implement the management setting: Disable Allow Shared Albums.
iPhone and iPad must have the latest available iOS/iPadOS operating system installed.
Apple iOS/iPadOS 15 must implement the management setting: use SSL for Exchange ActiveSync.
Apple iOS/iPadOS 15 must implement the management setting: not allow messages in an ActiveSync Exchange account to be forwarded or moved to other accounts in the Apple iOS/iPadOS 15 Mail app.
Apple iOS/iPadOS 15 must implement the management setting: Treat AirDrop as an unmanaged destination.
Apple iOS/iPadOS 15 must implement the management setting: not have any Family Members in Family Sharing.
Apple iOS/iPadOS 15 must implement the management setting: not share location data through iCloud.
Apple iOS/iPadOS 15 must implement the management setting: force Apple Watch wrist detection.
Apple iOS/iPadOS 15 users must complete required training.
A managed photo app must be used to take and store work-related photos.
Apple iOS/iPadOS 15 must implement the management setting: enable USB Restricted Mode.
Apple iOS/iPadOS 15 must not allow managed apps to write contacts to unmanaged contacts accounts.
Apple iOS/iPadOS 15 must not allow unmanaged apps to read contacts from managed contacts accounts.
Apple iOS/iPadOS 15 must implement the management setting: disable AirDrop.
Apple iOS/iPadOS 15 must implement the management setting: disable paired Apple Watch.
Apple iOS/iPadOS 15 must disable Password AutoFill in browsers and applications.
Apple iOS/iPadOS 15 must disable allow setting up new nearby devices.
Apple iOS/iPadOS 15 must disable password proximity requests.
Apple iOS/iPadOS 15 must disable password sharing.
Apple iOS/iPadOS 15 must disable Find My Friends in the Find My app.
The Apple iOS/iPadOS 15 must be supervised by the MDM.
Apple iOS/iPadOS 15 must disable "Allow USB drive access in Files app" if the Authorizing Official (AO) has not approved the use of DoD-approved USB storage drives with iOS/iPadOS devices.
The Apple iOS must be configured to disable automatic transfer of diagnostic data to an external device other than an MDM service with which the device has enrolled.
Apple iOS must implement the management setting: not allow a user to remove Apple iOS configuration profiles that enforce DoD security requirements.
Apple iOS/iPadOS 15 must disable "Allow network drive access in Files access".
Apple iOS/iPadOS 15 must disable connections to Siri servers for the purpose of dictation.
Apple iOS/iPadOS 15 must disable connections to Siri servers for the purpose of translation.
Apple iOS/iPadOS 15 must disable copy/paste of data from managed to unmanaged applications.
The ALG must be configured in accordance with the security configuration settings based on DoD security policy and technology-specific security best practices.
The ALG that provides intermediary services for SMTP must inspect inbound and outbound SMTP and Extended SMTP communications traffic for protocol compliance and protocol anomalies.
The ALG that intermediary services for FTP must inspect inbound and outbound FTP communications traffic for protocol compliance and protocol anomalies.
The ALG that provides intermediary services for HTTP must inspect inbound and outbound HTTP traffic for protocol compliance and protocol anomalies.
The ALG that is part of a CDS must use source and destination security attributes associated with organization-defined information, source, and/or destination objects to enforce organization-defined information flow control policies as a basis for flow control decisions.
The ALG that is part of a CDS must allow privileged administrators to enable/disable all security policy filters used to enforce information flow control.
The ALG that is part of a CDS must allow privileged administrators to configure and make changes to all security policy filters that are used to enforce information flow control.
The ALG that is part of a CDS, when transferring information between different security domains, must use organization-defined data type identifiers to validate data essential for information flow decisions.
The ALG that is part of a CDS must decompose information into organization-defined, policy-relevant subcomponents for submission to policy enforcement mechanisms before transferring information between different security domains.
The ALG that is part of a CDS, when transferring information between different security domains, must implement organization-defined security policy filters requiring fully enumerated formats that restrict data structure and content.
The ALG that is part of a CDS, when transferring information between different security domains, must examine the information for the presence of organization-defined unsanctioned information.
The ALG that is part of a CDS must prohibit the transfer of unsanctioned information in accordance with the security policy when transferring information between different security domains.
The ALG that is part of a CDS must uniquely identify and authenticate source by organization, system, application, and/or individual for information transfer.
The ALG that is part of a CDS must uniquely identify and authenticate destination by organization, system, application, and/or individual for information transfer.
The ALG that is part of a CDS must bind security attributes to information using organization-defined binding techniques to facilitate information flow policy enforcement.
The ALG that is part of a CDS, when transferring information between different security domains, must apply the same security policy filtering to metadata as it applies to data payloads.
The ALG that is part of a CDS must enforce dynamic traffic flow control based on organization-defined policies.
The ALG that is part of a CDS must enforce information flow control based on organization-defined metadata.
The ALG that is part of a CDS must block the transfer of data with malformed security attribute metadata structures.
The ALG that is part of a CDS must enforce organization-defined one-way information flows using hardware mechanisms.
The ALG that is part of a CDS must enforce information flow control using organization-defined security policy filters as a basis for flow control decisions for organization-defined information flows.
The ALG that is part of a CDS must enforce the use of human reviews for organization-defined information flows under organization-defined conditions.
The Arista Multilayer Switch must activate a system alert message, send an alarm, and/or automatically shut down when a component failure is detected.
The Arista Multilayer Switch must be configured to synchronize internal information system clocks with the primary and secondary time sources located in different geographic regions using redundant authoritative time sources.
The Arista Multilayer Switch must protect the audit records of nonlocal accesses to privileged accounts and the execution of privileged functions.
The Arista Multilayer Switch must employ AAA service to centrally manage authentication settings.
The Arista Multilayer Switch must support organizational requirements to conduct backups of system-level information contained in the information system when changes occur or weekly, whichever is sooner.
The Arista Multilayer Switch must be updated to one of the minimum approved versions of EOS.
The Arista Multilayer Switch must enforce information flow control using explicit security attributes (for example, IP addresses, port numbers, protocol, Autonomous System, or interface) on information, source, and destination objects.
The Arista Multilayer Switch must enable neighbor router authentication for control plane protocols except RIP.
The application server must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.
The Arista MLS layer 2 switch must have IGMP or MLD Snooping configured on all VLANs.
The Arista MLS layer 2 Arista MLS switch must implement Rapid STP where VLANs span multiple switches with redundant links.
The Arista MLS layer 2 switch must enable Unidirectional Link Detection (UDLD) to protect against one-way connections.
The Arista MLS layer 2 switch must have all trunk links enabled statically.
The Arista MLS layer 2 switch must have all disabled switch ports assigned to an unused VLAN.
The Arista MLS layer 2 switch must not have the default VLAN assigned to any host-facing switch ports.
The Arista MLS layer 2 switch must have the default VLAN pruned from all trunk ports that do not require it.
The Arista MLS layer 2 switch must not use the default VLAN for management traffic.
The Arista MLS layer 2 switch must have all user-facing or untrusted ports configured as access switch ports.
The Arista MLS layer 2 switch must have the native VLAN assigned to an ID other than the default VLAN for all 802.1q trunk links.
The Arista MLS layer 2 switch must not have any switch ports assigned to the native VLAN.
The Arista network device must be running an operating system release that is currently supported by the vendor.
The application must have a process, feature or function that prevents removal or disabling of emergency accounts.
The Arista BGP router must be configured to use its loopback address as the source address for iBGP peering sessions.
The MPLS router must be configured to use its loopback address as the source address for LDP peering sessions.
The MPLS router must be configured to synchronize IGP and LDP to minimize packet loss when an IGP adjacency is established prior to LDP peers completing label exchange.
The MPLS router must be configured to have TTL propagation disabled.
The PE router must be configured to have each Virtual Routing and Forwarding (VRF) instance bound to the appropriate physical or logical interfaces to maintain traffic separation between all MPLS L3VPNs.
The PE router must be configured to have each Virtual Routing and Forwarding (VRF) instance with the appropriate Route Target (RT).
The PE router must be configured to have each VRF with the appropriate Route Distinguisher (RD).
The PE router providing MPLS Virtual Private Wire Service (VPWS) must be configured to have the appropriate virtual circuit identification (VC ID) for each attachment circuit.
The Arista Multicast Source Discovery Protocol (MSDP) router must be configured to use its loopback address as the source address when originating MSDP traffic.
The Arista router must be configured to advertise a hop limit of at least 32 in Router Advertisement messages for IPv6 stateless auto-configuration deployments.
The Arista router must not be configured to use IPv6 Site Local Unicast addresses.
The Arista perimeter router must be configured to suppress Router Advertisements on all external IPv6-enabled interfaces.
An application vulnerability assessment must be conducted.
The application must not be vulnerable to race conditions.
Execution flow diagrams and design documents must be created to show how deadlock and recursion issues in web services are being mitigated.
The BlackBerry UEM server must [selection: invoke platform-provided functionality, implement functionality] to generate an audit record of the following auditable events: c. [selection: Commands issued to the MDM Agent].
The BlackBerry UEM server must be configured to communicate the following commands to the MDM Agent: read audit logs kept by the MD.
The BlackBerry UEM server must be configured to have at least one user in the following Administrator roles: Server primary administrator, security configuration administrator, device user group administrator, or auditor.
The BlackBerry UEM server must be maintained at a supported version.
The BlackBerry Enterprise Mobility Server (BEMS) must be configured to have at least one user in the following Administrator roles: Server primary administrator, auditor.
If the BlackBerry Connect service is installed on the BlackBerry Enterprise Mobility Server (BEMS), it must be configured to enable the Web Proxy.
If the BlackBerry Presence service is installed on the BlackBerry Enterprise Mobility Server (BEMS), it must be configured with the whitelisting control to limit presence subscriptions to only single domain/tenant.
If the BlackBerry Docs service is installed on the BlackBerry Enterprise Mobility Server (BEMS), it must be configured to enable the proxy server authentication type (if a proxy is used).
A BIND 9.x server implementation must be operating on a Current-Stable version as defined by ISC.
The platform on which the name server software is hosted must only run processes and services needed to support the BIND 9.x implementation.
The BIND 9.x server software must run with restricted privileges.
The host running a BIND 9.X implementation must implement a set of firewall rules that restrict traffic on the DNS interface.
The host running a BIND 9.x implementation must use a dedicated management interface in order to separate management traffic from DNS specific traffic.
The host running a BIND 9.x implementation must use an interface that is configured to process only DNS traffic.
In the event of an error when validating the binding of other DNS servers identity to the BIND 9.x information, when anomalies in the operation of the signed zone transfers are discovered, for the success and failure of start and stop of the name server service or daemon, and for the success and failure of all name server events, a BIND 9.x server implementation must generate a log entry.
A BIND 9.x server implementation must prohibit recursion on authoritative name servers.
The master servers in a BIND 9.x implementation must notify authorized secondary name servers when zone files are updated.
The secondary name servers in a BIND 9.x implementation must be configured to initiate zone update notifications to other authoritative zone name servers.
On the BIND 9.x server the platform on which the name server software is hosted must be configured to send outgoing DNS messages from a random port.
The BIND 9.X implementation must not utilize a TSIG or DNSSEC key for more than one year.
On the BIND 9.x server the private keys corresponding to both the ZSK and the KSK must not be kept on the BIND 9.x DNSSEC-aware primary authoritative name server when the name server does not support dynamic updates.
The two files generated by the BIND 9.x server dnssec-keygen program must be owned by the root account, or deleted, after they have been copied to the key file in the name server.
The two files generated by the BIND 9.x server dnssec-keygen program must be group owned by the server administrator account, or deleted, after they have been copied to the key file in the name server.
Permissions assigned to the dnssec-keygen keys used with the BIND 9.x implementation must enforce read-only access to the key owner and deny access to all other users.
The core BIND 9.x server files must be owned by the root or BIND 9.x process account.
The core BIND 9.x server files must be group owned by a group designated for DNS administration only.
The permissions assigned to the core BIND 9.x server files must be set to utilize the least privilege possible.
On a BIND 9.x server for zones split between the external and internal sides of a network, the RRs for the external hosts must be separate from the RRs for the internal hosts.
On a BIND 9.x server in a split DNS configuration, where separate name servers are used between the external and internal networks, the external name server must be configured to not be reachable from inside resolvers.
On a BIND 9.x server in a split DNS configuration, where separate name servers are used between the external and internal networks, the internal name server must be configured to not be reachable from outside resolvers.
A BIND 9.x server implementation must implement internal/external role separation.
On the BIND 9.x server the IP address for hidden master authoritative name servers must not appear in the name servers set in the zone database.
A BIND 9.x implementation operating in a split DNS configuration must be approved by the organizations Authorizing Official.
On the BIND 9.x server the private key corresponding to the ZSK, stored on name servers accepting dynamic updates, must be owned by root.
On the BIND 9.x server the private key corresponding to the ZSK, stored on name servers accepting dynamic updates, must be group owned by root.
A BIND 9.x server implementation must enforce approved authorizations for controlling the flow of information between authoritative name servers and specified secondary name servers based on DNSSEC policies.
A BIND 9.x server validity period for the RRSIGs covering a zones DNSKEY RRSet must be no less than two days and no more than one week.
A BIND 9.x server NSEC3 must be used for all internal DNS zones.
Every NS record in a zone file on a BIND 9.x server must point to an active name server and that name server must be authoritative for the domain specified in that record.
On a BIND 9.x server all authoritative name servers for a zone must be located on different network segments.
On a BIND 9.x server all authoritative name servers for a zone must have the same version of zone information.
On a BIND 9.x server all root name servers listed in the local root zone file hosted on a BIND 9.x authoritative name server must be valid for that zone.
On a BIND 9.x server all root name servers listed in the local root zone file hosted on a BIND 9.x authoritative name server must be empty or removed.
On the BIND 9.x server a zone file must not include resource records that resolve to a fully qualified domain name residing in another zone.
On the BIND 9.x server CNAME records must not point to a zone with lesser security for more than six months.
The BIND 9.x server implementation must prohibit the forwarding of queries to servers controlled by organizations outside of the U.S. Government.
The CA API Gateway must employ RADIUS + LDAPS or LDAPS to centrally manage authentication settings.
The CA API Gateway must activate a system alert message, send an alarm, and/or automatically shut down when a component failure is detected.
The CA API Gateway must transmit organization-defined access authorization information using organization-defined security safeguards to organization-defined information systems which enforce access control decisions.
The CA API Gateway must be configured to synchronize internal information system clocks with the primary and secondary time sources located in different geographic regions using redundant authoritative time sources.
The CA API Gateway must generate audit log events for a locally developed list of auditable events.
The CA API Gateway must employ automated mechanisms to assist in the tracking of security incidents.
The CA API Gateway must employ automated mechanisms to detect the addition of unauthorized components or devices.
The CA API Gateway that provides intermediary services for FTP must inspect inbound and outbound FTP communications traffic for protocol compliance and protocol anomalies.
The CA API Gateway that provides intermediary services for HTTP must inspect inbound and outbound HTTP traffic for protocol compliance and protocol anomalies.
The Central Log Server must be configured to retain the identity of the original source host or device where the event occurred as part of the log record.
The Central Log Server that aggregates log records from hosts and devices must be configured to use TCP for transmission.
The Central Log Server must be configured to notify the System Administrator (SA) and Information System Security Officer (ISSO), at a minimum, when an attack is detected on multiple devices and hosts within its scope of coverage.
The Central Log Server must be configured to automatically create trouble tickets for organization-defined threats and events of interest as they are detected in real time (within seconds).
For devices and hosts within the scope of coverage, the Central Log Server must be configured to automatically aggregate events that indicate account actions.
The Central Log Server must be configured with the organization-defined severity or criticality levels of each event that is being sent from individual devices or hosts.
Analysis, viewing, and indexing functions, services, and applications used as part of the Central Log Server must be configured to comply with DoD-trusted path and access requirements.
The Central Log Server must be configured so changes made to the level and type of log records stored in the centralized repository must take effect immediately without the need to reboot or restart the application.
Citrix Delivery Controller must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.
Delivery Controller must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.
When implemented for protection of the database tier, the DBN-6300 must be logically connected for maximum database traffic visibility.
When implemented for discovery protection against unidentified or rogue databases, the DBN-6300 must provide a catalog of all visible databases and database services.
The DBN-6300 must be compliant with at least one IETF Internet standard authentication protocol.
The DBN-6300 must generate audit log events for a locally developed list of auditable events.
The DBN-6300 must activate a system alert message, send an alarm, and/or automatically shut down when a component failure is detected.
The DBN-6300 must be configured to send log data to a syslog server for the purpose of forwarding alerts to the administrators and the ISSO.
Accounts for device management must be configured on the authentication server and not the network device itself, except for the account of last resort.
The DBN-6300 must obtain its public key certificates from an appropriate certificate policy through an approved service provider.
Docker Swarm must have the minimum number of manager nodes.
Docker Enterprise Swarm manager auto-lock key must be rotated periodically.
Docker Enterprise node certificates must be rotated as defined in the System Security Plan (SSP).
Docker Enterprise docker.service file ownership must be set to root:root.
Docker Enterprise docker.service file permissions must be set to 644 or more restrictive.
Docker Enterprise docker.socket file ownership must be set to root:root.
Docker Enterprise docker.socket file permissions must be set to 644 or more restrictive.
Docker Enterprise /etc/docker directory ownership must be set to root:root.
Docker Enterprise /etc/docker directory permissions must be set to 755 or more restrictive.
Docker Enterprise registry certificate file ownership must be set to root:root.
Docker Enterprise registry certificate file permissions must be set to 444 or more restrictive.
Docker Enterprise TLS certificate authority (CA) certificate file ownership must be set to root:root.
Docker Enterprise TLS certificate authority (CA) certificate file permissions must be set to 444 or more restrictive.
Docker Enterprise server certificate file ownership must be set to root:root.
Docker Enterprise server certificate file permissions must be set to 444 or more restrictive.
Docker Enterprise server certificate key file ownership must be set to root:root.
Docker Enterprise server certificate key file permissions must be set to 400.
Docker Enterprise socket file ownership must be set to root:docker.
Docker Enterprise socket file permissions must be set to 660 or more restrictive.
Docker Enterprise daemon.json file ownership must be set to root:root.
Docker Enterprise daemon.json file permissions must be set to 644 or more restrictive.
Docker Enterprise /etc/default/docker file ownership must be set to root:root.
Docker Enterprise /etc/default/docker file permissions must be set to 644 or more restrictive.
The DNS server implementation must, when a component failure is detected, activate a notification to the system administrator.
The DNS server implementation must strongly bind the identity of the DNS server with the DNS information.
The DNS server implementation must provide the means for authorized individuals to determine the identity of the source of the DNS server-provided information.
The DNS server implementation must validate the binding of the other DNS servers identity to the DNS information for a server-to-server transaction (e.g., zone transfer).
In the event of an error when validating the binding of another DNS servers identity to the DNS information, the DNS server implementation must log the event and send notification to the DNS administrator.
The DNS implementation must prohibit recursion on authoritative name servers.
A DNS server implementation must provide data origin artifacts for internal name/address resolution queries.
A DNS server implementation must provide data integrity protection artifacts for internal name/address resolution queries.
The DNS server implementation must follow procedures to re-role a secondary name server as the master name server should the master name server permanently lose functionality.
The salt value for zones signed using NSEC3 RRs must be changed every time the zone is completely re-signed.
The validity period for the RRSIGs covering a zones DNSKEY RRSet must be no less than two days and no more than one week.
NSEC3 must be used for all internal DNS zones.
The DNS implementation must ensure each NS record in a zone file points to an active name server authoritative for the domain specified in that record.
The two files generated by the dnssec-keygen program must be made accessible only to the server administrator account, or deleted, after they have been copied to the key file in the name server.
All authoritative name servers for a zone must be located on different network segments.
All authoritative name servers for a zone must have the same version of zone information.
An authoritative name server must be configured to enable DNSSEC Resource Records.
Digital signature algorithm used for DNSSEC-enabled zones must be FIPS-compatible.
For zones split between the external and internal sides of a network, the RRs for the external hosts must be separate from the RRs for the internal hosts.
In a split DNS configuration, where separate name servers are used between the external and internal networks, the external name server must be configured to not be reachable from inside resolvers.
In a split DNS configuration, where separate name servers are used between the external and internal networks, the internal name server must be configured to not be reachable from outside resolvers.
Primary authoritative name servers must be configured to only receive zone transfer requests from specified secondary name servers.
The DNS implementation must be conformant to the IETF DNS specification.
The DNS implementation must enforce a Discretionary Access Control (DAC) policy that limits propagation of access rights.
The DNS implementation must implement internal/external role separation.
The DNS must utilize valid root name servers in the local root zone file.
The DNS name server software must be at the latest version.
The DNS Name Server software must run with restricted privileges.
The IP address for hidden master authoritative name servers must not appear in the name servers set in the zone database.
The platform on which the name server software is hosted must be configured to respond to DNS traffic only.
The platform on which the name server software is hosted must be configured to send outgoing DNS messages from a random port.
The private key corresponding to the ZSK, stored on name servers accepting dynamic updates, must have appropriate directory/file-level access control list-based or cryptography-based protections.
The private keys corresponding to both the ZSK and the KSK must not be kept on the DNSSEC-aware primary authoritative name server when the name server does not support dynamic updates.
A zone file must not include resource records that resolve to a fully qualified domain name residing in another zone.
CNAME records must not point to a zone with lesser security for more than six months.
The DNS server implementation must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.
All authoritative name servers for a zone must be geographically disbursed.
The firewall must be configured to use TCP when sending log records to the central audit server.
The firewall must be configured to inspect all inbound and outbound traffic at the application layer.
The firewall must be configured to inspect all inbound and outbound IPv6 traffic for unknown or out-of-order extension headers.
The firewall must be configured to restrict it from accepting outbound packets that contain an illegitimate address in the source address field via an egress filter or by enabling Unicast Reverse Path Forwarding (uRPF).
The FortiGate device must synchronize internal information system clocks using redundant authoritative time sources.
The FortiGate device must enforce access restrictions associated with changes to the system components.
The FortiGate device must use LDAP for authentication.
The FortiGate device must be running an operating system release that is currently supported by the vendor.
The FortiGate device must generate log records for a locally developed list of auditable events.
The FortiGate device must conduct backups of system-level information contained in the information system when changes occur.
The FortiGate device must support organizational requirements to conduct backups of information system documentation, including security-related documentation, when changes occur or weekly, whichever is sooner.
FortiGate devices performing maintenance functions must restrict use of these functions to authorized personnel only.
The FortiGate device must use DoD-approved Certificate Authorities (CAs) for public key certificates.
The FortiGate firewall must be configured to inspect all inbound and outbound traffic at the application layer.
The FortiGate firewall must be configured to restrict it from accepting outbound packets that contain an illegitimate address in the source address field via an egress filter or by enabling Unicast Reverse Path Forwarding (uRPF).
CounterACT must enforce access restrictions associated with changes to the system components.
CounterACT must generate audit log events for a locally developed list of auditable events.
CounterACT must support organizational requirements to conduct backups of system-level information contained in the information system when changes occur or weekly, whichever is sooner.
CounterACT must support organizational requirements to conduct backups of information system documentation, including security-related documentation, when changes occur or weekly, whichever is sooner.
CounterACT must obtain its public key certificates from an appropriate certificate policy through an approved service provider.
CounterACT must enable Threat Protection notifications to alert security personnel to Cyber events detected by a CounterACT IAW CJCSM 6510.01B.
CounterACT appliances performing maintenance functions must restrict use of these functions to authorized personal only.
CounterACT must employ automated mechanisms to centrally apply authentication settings.
CounterACT must be configured to synchronize internal information system clocks with the organizations primary and secondary NTP servers.
The network device must be configured to use a centralized authentication server to authenticate privileged users for remote and nonlocal access for device management.
Administrative accounts for device management must be configured on the authentication server and not the network device itself (except for the account of last resort).
Forescout must be configured to synchronize internal information system clocks using redundant authoritative time sources.
Forescout must enforce access restrictions associated with changes to the firmware, OS, USB port, and console port.
Forescout must be configured to use an authentication server for the purpose of authenticating users prior to granting administrative access.
Forescout must be running an operating system release that is currently supported by the vendor.
If the network device uses role-based access control, Forescout must enforce organization-defined, role-based access control policies over defined subjects and objects.
Forescout must generate log records for a locally developed list of auditable events.
Forescout must be configured to conduct backups of system-level information contained in the information system when changes occur.
Forescout must support organizational requirements to conduct backups of information system documentation, including security-related documentation, when changes occur or weekly, whichever is sooner.
Forescout must obtain its public key certificates from an appropriate certificate policy through an approved service provider.
Google Android 12 must be configured to not allow passwords that include more than two repeating or sequential characters.
Google Android 12 must be configured to enforce an application installation policy by specifying one or more authorized application repositories, including [selection: DoD-approved commercial app repository, MDM server, mobile application store].
Google Android 12 allowlist must be configured to not include applications with the following characteristics: 1. Back up mobile device (MD) data to non-DoD cloud servers (including user and application access to cloud backup services);2. Transmit MD diagnostic data to non-DoD servers;3. Voice assistant application if available when MD is locked;4. Voice dialing application if available when MD is locked;5. Allows synchronization of data or applications between devices associated with user; and6. Allows unencrypted (or encrypted but not FIPS 140-2 validated) data sharing with other MDs or printers.
Forescout must perform continuous detection and tracking of endpoint devices attached to the network. This is required for compliance with C2C Step 1.
Google Android 13 must be configured to not allow passwords that include more than four repeating or sequential characters.
Google Android 13 must be configured to enforce an application installation policy by specifying one or more authorized application repositories, including [selection: DOD-approved commercial app repository, MDM server, mobile application store].
Google Android 13 allowlist must be configured to not include applications with the following characteristics:
1. Back up mobile device (MD) data to non-DOD cloud servers (including user and application access to cloud backup services);
2. Transmit MD diagnostic data to non-DOD servers;
3. Voice assistant application if available when MD is locked;
4. Voice dialing application if available when MD is locked;
5. Allows synchronization of data or applications between devices associated with user; and
6. Allows unencrypted (or encrypted but not FIPS 140-2 validated) data sharing with other MDs or printers.
Google Android 13 must be configured to disable multiuser modes.
Google Android 13 must be configured to disable Bluetooth or configured via User Based Enforcement (UBE) to allow Bluetooth for only Headset Profile (HSP), Hands-Free Profile (HFP), and Serial Port Profile (SPP).
Google Android 13 users must complete required training.
Google Android 13 must be configured to enforce that Wi-Fi Sharing is disabled.
Google Android 13 must have the DOD root and intermediate PKI certificates installed.
The Google Android 13 work profile must be configured to enforce the system application disable list.
Google Android 13 must be configured to disallow configuration of date and time.
Android 13 devices must have the latest available Google Android 13 operating system installed.
Android 13 devices must be configured to disable the use of third-party keyboards.
Android 13 devices must be configured to enable Common Criteria Mode (CC Mode).
The Google Android 13 must allow only the administrator (EMM) to install/remove DOD root and intermediate PKI certificates.
Google Android 12 must be configured to disable multiuser modes.
Google Android 12 must be configured to disable Bluetooth or configured via User Based Enforcement (UBE) to allow Bluetooth for only Headset Profile (HSP), Hands-Free Profile (HFP), and Serial Port Profile (SPP).
Google Android 12 users must complete required training.
Google Android 12 must be configured to enforce that Wi-Fi Sharing is disabled.
Google Android 12 must have the DoD root and intermediate PKI certificates installed.
Google Android 12 work profile must be configured to enforce the system application disable list.
Google Android 12 work profile must be configured to disable automatic completion of work space Internet browser text input.
Google Android 12 must be configured to disallow configuration of date and time.
Android 12 devices must have the latest available Google Android 12 operating system installed.
Android 12 devices must be configured to disable the use of third-party keyboards.
Android 12 devices must be configured to enable Common Criteria Mode (CC Mode).
Google Android 12 must allow only the administrator (EMM) to install/remove DoD root and intermediate PKI certificates.
The Google Android 12 Work Profile must be configured to prevent users from adding personal email accounts to the work email app.
Google Android 12 must be provisioned as a fully managed device and configured to create a work profile.
Google Android 12 Work Profile must be configured to disable the autofill services.
The Google Android 13 work profile must be configured to prevent users from adding personal email accounts to the work email app.
Google Android 13 must be provisioned as a fully managed device and configured to create a work profile.
The Google Android 13 work profile must be configured to disable automatic completion of work space internet browser text input.
The Google Android 13 work profile must be configured to disable the autofill services.
The HP FlexFabric Switch must implement Rapid STP where VLANs span multiple switches with redundant links.
The HP FlexFabric Switch must enable Device Link Detection Protocol (DLDP) to protect against one-way connections.
The HP FlexFabric Switch must have all trunk links enabled statically.
The HP FlexFabric Switch must have all disabled switch ports assigned an unused VLAN.
The HP FlexFabric Switch must not have the default VLAN assigned to any host-facing switch ports.
The HP FlexFabric Switch must have the default VLAN pruned from all trunk ports that do not require it.
The HP FlexFabric Switch must not use the default VLAN for management traffic.
The HP FlexFabric Switch must have all user-facing or untrusted ports configured as access switch ports.
The HP FlexFabric Switch must have the native VLAN assigned to a VLAN ID other than the default VLAN ID for all 802.1q trunk links.
The HP FlexFabric Switch must not have any access switch ports assigned to the native VLAN.
Upon successful logon, the HP FlexFabric Switch must notify the administrator of the date and time of the last logon.
Upon successful logon, the HP FlexFabric Switch must notify the administrator of the number of unsuccessful logon attempts since the last successful logon.
If the HP FlexFabric Switch uses role-based access control, the HP FlexFabric Switch must enforce organization-defined role-based access control policies over defined subjects and objects.
The HP FlexFabric Switch must notify the administrator, upon successful logon (access), of the location of last logon (terminal or IP address) in addition to the date and time of the last logon (access).
The HP FlexFabric Switch must be configured to synchronize internal information system clocks with the primary and secondary time sources located in different geographic regions using redundant authoritative time sources.
If the HP FlexFabric Switch uses mandatory access control, the HP FlexFabric Switch must enforce organization-defined mandatory access control policies over all subjects and objects.
The HP FlexFabric Switch must notify the administrator of the number of successful logon attempts occurring during an organization-defined time period.
The HP FlexFabric Switch must generate audit log events for a locally developed list of auditable events.
The HP FlexFabric Switch must enforce access restrictions associated with changes to the system components.
The HP FlexFabric Switch must support organizational requirements to conduct backups of system level information contained in the information system when changes occur or weekly, whichever is sooner.
The HP FlexFabric Switch must employ automated mechanisms to assist in the tracking of security incidents.
The HP FlexFabric Switch must obtain its public key certificates from an appropriate certificate policy through an approved service provider.
The HP FlexFabric Switch must enable neighbor authentication for all control plane protocols.
The HP FlexFabric Switch must have a local account that will only be used as an account of last resort with full access to the network device.
The HP FlexFabric switch must be configured to utilize an authentication server for the purpose of authenticating privilege users, managing accounts, and to centrally verify authentication settings and Personal Identity Verification (PIV) credentials.
The HP FlexFabric switch must be configured to send log data to a syslog server for the purpose of forwarding alerts to the administrators and the ISSO.
The HP FlexFabric switch must be configured to send SNMP traps and notifications to the SNMP manager for the purpose of sending alarms and notifying appropriate personnel as required by specific events.
The CIM service must be disabled, unless needed.
DoD-approved encryption must be implemented to protect the confidentiality and integrity of remote access sessions, information during preparation for transmission, information during reception, and information during transmission in addition to enforcing replay-resistant authentication mechanisms for network access to privileged accounts.
SNMP must be changed from default settings and must be configured on the storage system to provide alerts of critical events that impact system security.
The SNMP service on the storage system must use only SNMPv3 or its successors.
The SNMP service on the storage system must require the use of a FIPS 140-2 approved cryptographic hash algorithm as part of its authentication and integrity methods.
The storage system must only be operated in conjunction with an LDAP server in a trusted environment if an Active Directory server is not available.
The storage system must only be operated in conjunction with an Active Directory server in a trusted environment if an LDAP server is not available.
If the HYCU Server or Web UI uses discretionary access control, the network device must enforce organization-defined discretionary access control policies over defined subjects and objects.
The HYCU VM/server must be configured to disable SSH.
The HYCU VM console and HYCU Web UI must be configured to use an authentication server for authenticating users prior to granting access to protect against an individual (or process acting on behalf of an individual) falsely denying having performed organization-defined requirements.
The HYCU server must generate audit records for privileged activities or other system-level access.
The HYCU server must be configured to conduct backups of system-level information when changes occur and to offload audit records onto a different system or media.
The HYCU server must be configured to synchronize internal information system clocks using redundant authoritative time sources.
The HYCU appliance must be running a release that is currently supported by the vendor.
The HYCU server must back up audit records at least every seven days onto a different system or system component than the system or component being audited.
The HYCU server must obtain its public key certificates from an appropriate certificate policy through an approved service provider.
Recursion must be disabled on Infoblox DNS servers that are configured as authoritative name servers.
The validity period for the Resource Record Signatures (RRSIGs) covering a zone's DNSKEY RRSet must be no less than two days and no more than one week.
NSEC3 must be used for all DNSSEC signed zones.
The Infoblox DNS server must be configured so that each name server (NS) record in a zone file points to an active name server authoritative for the domain specified in that record.
An authoritative name server must be configured to enable DNSSEC resource records.
The digital signature algorithm used for DNSSEC-enabled zones must be FIPS compatible.
For zones split between the external and internal sides of a network, the resource records (RRs) for the external hosts must be separate from the RRs for the internal hosts.
The Infoblox system must use a security policy that limits the propagation of access rights.
The Infoblox DNS server must use current and valid root name servers.
The Infoblox NIOS version must be at the appropriate version.
The Infoblox system must be configured to respond to DNS traffic only.
The Infoblox DNS server must send outgoing DNS messages from a random port.
The private keys corresponding to both the Zone Signing Key (ZSK) and the Key Signing Key (KSK) must not be kept on the DNSSEC-aware primary authoritative name server when the name server does not support dynamic updates.
The Infoblox system must use the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.
A secure out-of-band (OOB) network must be used for management of Infoblox Grid Members.
Infoblox systems must enforce current DoD password restrictions.
Infoblox Grid configuration must be backed up on a regular basis.
The Infoblox system must display the approved DoD notice and consent banner.
The Infoblox system must display the appropriate security classification information.
The Infoblox system must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.
The Infoblox system must present only approved TLS and SSL cipher suites.
An Infoblox DNS server must strongly bind the identity of the DNS server with the DNS information using DNSSEC.
The Infoblox system must provide the means for authorized individuals to determine the identity of the source of the DNS server-provided information.
The Infoblox system must validate the binding of the other DNS servers' identity to the DNS information for a server-to-server transaction (e.g., zone transfer).
The Infoblox system must send a notification in the event of an error when validating the binding of another DNS server’s identity to the DNS information.
The Infoblox DNS server must provide data origin artifacts for internal name/address resolution queries.
The Infoblox DNS server must provide data integrity protection artifacts for internal name/address resolution queries.
The Infoblox system must notify the system administrator when a component failure is detected.
The Infoblox DNS server implementation must follow procedures to re-role a secondary name server as the master name server should the master name server permanently lose functionality.
The DataPower Gateway must activate a system alert message, send an alarm, and/or automatically shut down when a component failure is detected.
The DataPower Gateway must be compliant with at least one IETF standard authentication protocol.
If the DataPower Gateway uses role-based access control, the DataPower Gateway must enforce role-based access control policies over defined subjects and objects.
The DataPower Gateway must be configured to synchronize internal information system clocks with the primary and secondary time sources located in different geographic regions using redundant authoritative time sources.
The DataPower Gateway must use automated mechanisms to alert security personnel to threats identified by authoritative sources (e.g., CTOs) and in accordance with CJCSM 6510.01B.
The DataPower Gateway must generate audit log events for a locally developed list of auditable events.
The DataPower Gateway must employ automated mechanisms to centrally manage authentication settings.
The DataPower Gateway must employ automated mechanisms to centrally apply authentication settings.
The DataPower Gateway must employ automated mechanisms to centrally verify authentication settings.
The DataPower Gateway must support organizational requirements to conduct backups of system level information contained in the information system when changes occur or weekly, whichever is sooner.
The DataPower Gateway must employ automated mechanisms to assist in the tracking of security incidents.
The DataPower Gateway must obtain its public key certificates from an appropriate certificate policy through an approved service provider.
Initial Program Load (IPL) Procedures must exists for each partition defined to the system.
Power On Reset (POR) Procedures must be documented for each system.
System shutdown procedures documentation must exist for each partition defined to the system.
Backup of critical data for the HMC and its components must be documented and tracked
The MaaS360 MDM server must be configured to have at least one user in the following Administrator roles: Server primary administrator, security configuration administrator, device user group administrator, auditor.
The MaaS360 MDM server must be configured to enable all required audit events (if function is not automatically implemented during MDM/MAS server install): a. Failure to push a new application on a managed mobile device.
The MaaS360 server must be configured to enable all required audit events (if function is not automatically implemented during MDM/MAS server install): b. Failure to update an existing application on a managed mobile device.
The MQ Appliance network device must notify the administrator of changes to access and/or privilege parameters of the administrator account that occurred since the last logon.
The MQ Appliance network device must activate a system alert message, send an alarm, and/or automatically shut down when a component failure is detected.
The MQ Appliance network device must notify the administrator, upon successful logon (access), of the location of last logon (terminal or IP address) in addition to the result, date and time of the last logon (access).
The MQ Appliance network device must be configured to synchronize internal information system clocks with the primary and secondary time sources located in different geographic regions using redundant authoritative time sources.
The MQ Appliance network device must use automated mechanisms to alert security personnel to threats identified by authoritative sources (e.g., CTOs) and in association with CJCSM 6510.01B.
Administrative accounts for device management must be configured on the authentication server and not the MQ Appliance network device itself (except for the emergency administration account).
Access to the MQ Appliance network device must employ automated mechanisms to centrally apply authentication settings.
The MQ Appliance network device must support organizational requirements to conduct backups of system level information contained in the information system when changes occur or weekly, whichever is sooner.
The MQ Appliance network device must obtain its public key certificates from an appropriate certificate policy through an approved service provider.
SSH CLI access to the MQ Appliance management interface must be restricted to approved management workstations.
IBM zVM CA VM:Secure product PASSWORD user exit must be in use.
CA VM:Secure product Config Delay LOG option must be set to 0.
CA VM:Secure product NORULE record in the SECURITY CONFIG file must be configured to REJECT.
CA VM:Secure product SECURITY CONFIG file must be restricted to appropriate personnel.
CA VM:Secure product VMXRPI configuration file must be restricted to authorized personnel.
CA VM:Secure product DASD CONFIG file must be restricted to appropriate personnel.
CA VM:Secure product AUTHORIZ CONFIG file must be restricted to appropriate personnel.
CA VM:Secure product CONFIG file must be restricted to appropriate personnel.
CA VM:Secure Product SFS configuration file must be restricted to appropriate personnel.
CA VM:Secure product Rules Facility must be restricted to appropriate personnel.
IBM z/VM must employ a Session manager.
The IBM z/VM System administrator must develop a notification routine for account management.
The IBM z/VM system administrator must develop routines and processes for the proper configuration and maintenance of Software.
IBM z/VM must be protected by an external firewall that has a deny-all, allow-by-exception policy.
The IBM z/VM System administrator must develop routines and processes for notification in the event of audit failure.
The IBM z/VM system administrator must develop procedures maintaining information system operation in the event of anomalies.
IBM z/VM system administrator must develop procedures to manually control temporary, interactive, and emergency accounts.
IBM z/VM must have access to an audit reduction tool that allows for central data review and analysis.
The IBM z/VM system administrator must develop and perform a procedure to validate the correct operation of security functions.
IBM z/VM must employ Clock synchronization software.
The IBM z/VM systems requiring data at rest must employ IBMs DS8000 for full disk encryption.
The IBM z/VM TCP/IP NSLOOKUP statement for UFT servers must be properly configured.
The IBM z/VM TCP/IP DOMAINLOOKUP statement must be properly configured.
The IBM z/VM TCP/IP NSINTERADDR statement must be present in the TCPIP DATA configuration.
The IBM z/VM CHECKSUM statement must be included in the TCP/IP configuration file.
The IBM z/VM DOMAINSEARCH statement in the TCPIP DATA file must be configured with proper domain names for name resolution.
The IDPS must be configured in accordance with the security configuration settings based on DoD security policy and technology-specific security best practices.
The Infoblox system must be configured to activate a notification to the system administrator when a component failure is detected.
The Infoblox system must be configured to provide the means for authorized individuals to determine the identity of the source of the DNS server-provided information.
The Infoblox system must be configured to validate the binding of the other DNS servers identity to the DNS information for a server-to-server transaction (e.g., zone transfer).
Recursion must be disabled on Infoblox DNS servers which are configured as authoritative name servers.
The Zone Signing Key (ZSK) rollover interval must be configured to less than two months.
The Infoblox system must ensure each NS record in a zone file points to an active name server authoritative for the domain specified in that record.
Digital signature algorithm used for DNSSEC-enabled zones must be FIPS-compatible.
The Infoblox system must utilize valid root name servers in the local root zone file.
The Infoblox system must be configured to display the appropriate security classification information.
The Infoblox system must be configured with the approved DoD notice and consent banner.
Infoblox systems must be configured with current DoD password restrictions.
A secure Out Of Band (OOB) network must be utilized for management of Infoblox Grid Members.
The Ivanti MobileIron Core server must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.
MobileIron Sentry must be configured to synchronize internal information system clocks using redundant authoritative time sources.
MobileIron Sentry must enforce access restrictions associated with changes to the system components.
MobileIron Sentry must be configured to conduct backups of system level information contained in the information system when changes occur.
MobileIron Sentry must obtain its public key certificates from an appropriate certificate policy through an approved service provider.
MobileIron Sentry must be running an operating system release that is currently supported by MobileIron.
The ISEC7 EMM Suite must be configured to leverage the enterprise directory service accounts and groups for ISEC7 EMM Suite server admin identification and authentication.
The ISEC7 EMM Suite must configure the timeout for the console to be 15 minutes or less.
The ISEC7 EMM Suite, Tomcat installation, and ISEC7 Suite monitor must be configured to use the Windows Trust Store for the storage of digital certificates and keys.
The LockOutRealm must be configured with a login lockout time of 15 minutes.
The Sentry must be configured to prohibit or restrict the use of functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments.
When the Jamf Pro EMM server cannot establish a connection to determine the validity of a certificate, the server must not have the option to accept the certificate.
The Jamf Pro EMM server must be configured with an enterprise certificate for signing policies (if function is not automatically implemented during Jamf Pro EMM server install).
The Jamf Pro EMM server must be configured to have at least one user in the following Administrator roles: Server primary administrator, security configuration administrator, device user group administrator, auditor.
Jamf Pro EMM must be maintained at a supported version.
Separate MySQL user accounts with limited privileges must be created within Jamf Pro EMM.
MySQL database backups must be scheduled in Jamf Pro EMM.
The Jamf Pro EMM server must configure the MDM Agent/platform to enable the DOD required device enrollment restrictions allowed for enrollment [specific device model].
The JBoss server must be configured to bind the management interfaces to only management networks.
The Juniper router must be configured to synchronize its clock with the primary and secondary time sources using redundant authoritative time sources.
The Juniper router must be configured to generate log records for a locally developed list of auditable events.
The Juniper router must be configured to support organizational requirements to conduct backups of the configuration when changes occur.
The Juniper router must be configured to obtain its public key certificates from an appropriate certificate policy through an approved service provider.
The Juniper router must be configured with a master password that is used to generate encrypted keys for shared secrets.
The Juniper router must be running a Junos release that is currently supported by Juniper Networks.
The Juniper router must be configured to implement message authentication for all control plane protocols.
The Juniper router must be configured to use keys with a duration not exceeding 180 days for authenticating routing protocol messages.
The Juniper BGP router must be configured to use a unique key for each autonomous system (AS) that it peers with.
The Juniper BGP router must be configured to use its loopback address as the source address for iBGP peering sessions.
The Juniper MPLS router must be configured to use its loopback address as the source address for LDP peering sessions.
The Juniper MPLS router must be configured to synchronize IGP and LDP to minimize packet loss when an IGP adjacency is established prior to LDP peers completing label exchange.
The Juniper MPLS router must be configured to have TTL Propagation disabled.
The Juniper PE router must be configured to have each Virtual Routing and Forwarding (VRF) instance bound to the appropriate physical or logical interfaces to maintain traffic separation between all MPLS L3VPNs.
The Juniper PE router must be configured to have each Virtual Routing and Forwarding (VRF) instance with the appropriate Route Target (RT).
The Juniper PE router must be configured to have each VRF with the appropriate Route Distinguisher (RD).
The Juniper PE router providing MPLS Virtual Private Wire Service (VPWS) must be configured to have the appropriate virtual circuit identification (VC ID) for each attachment circuit.
The Juniper PE router providing Virtual Private LAN Services (VPLS) must be configured to have all attachment circuits defined to the routing instance with the globally unique VPLS ID assigned for each customer VLAN.
The Juniper Multicast Source Discovery Protocol (MSDP) router must be configured to use its loopback address as the source address when originating MSDP traffic.
The Juniper perimeter router must be configured to suppress Router Advertisements on all external IPv6-enabled interfaces.
The Juniper router must not be configured to use IPv6 Site Local Unicast addresses.
The Juniper Networks SRX Series Gateway IDPS must have only active Juniper Networks licenses.
The Juniper Networks SRX Series Gateway IDPS must either forward the traffic from inbound connections to be more deeply inspected for malicious code and Layer 7 threats, or the Antivirus and Unified Threat Management (UTM) license must be installed, active, and policies and rules configured.
If the loopback interface is used, the Juniper SRX Services Gateway must protect the loopback interface with firewall filters for known attacks that may exploit this interface.
The Juniper SRX Services Gateway must have the number of rollbacks set to 5 or more.
The Juniper SRX Services Gateway must be configured to synchronize internal information system clocks with the primary and secondary NTP servers for the network.
The Juniper SRX Services Gateway must be configured to use an authentication server to centrally manage authentication and logon settings for remote and nonlocal access.
The Juniper SRX Services Gateway must use DoD-approved PKI rather than proprietary or self-signed device certificates.
The Juniper SRX Services Gateway must be configured to use Junos 12.1 X46 or later to meet the minimum required version for DoD.
The Juniper SRX Services Gateway must automatically terminate a network administrator session after organization-defined conditions or trigger events requiring session disconnect.
For local accounts, the Juniper SRX Services Gateway must generate an alert message to the management console and generate a log event record that can be forwarded to the ISSO and designated system administrators when local accounts are created.
The Juniper SRX Services Gateway must generate an alert message to the management console and generate a log event record that can be forwarded to the ISSO and designated system administrators when the local accounts (i.e., the account of last resort or root account) are modified.
The Juniper SRX Services Gateway must generate an alert message to the management console and generate a log event record that can be forwarded to the ISSO and designated system administrators when accounts are disabled.
The Juniper SRX Services Gateway must generate alerts to the management console and generate a log record that can be forwarded to the ISSO and designated system administrators when the local accounts (i.e., the account of last resort or root account) are deleted.
The Juniper SRX Services Gateway must generate an immediate alert message to the management console for account enabling actions.
The Juniper SRX Services Gateway must allow only the ISSM (or administrators/roles appointed by the ISSM) to select which auditable events are to be generated and forwarded to the syslog and/or local logs.
For local logging, the Juniper SRX Services Gateway must generate a message to the system management console when a log processing failure occurs.
In the event that communications with the events server is lost, the Juniper SRX Services Gateway must continue to queue log records locally.
The Juniper SRX Services Gateway must be configured to use an authentication server to centrally apply authentication and logon settings for remote and nonlocal access for device management.
The Juniper SRX Services Gateway must be configured to use a centralized authentication server to authenticate privileged users for remote and nonlocal access for device management.
The Juniper SRX Services Gateway must specify the order in which authentication servers are used.
The Juniper SRX Services Gateway must detect the addition of components and issue a priority 1 alert to the ISSM and SA, at a minimum.
The Juniper SRX Services Gateway must generate an alarm or send an alert message to the management console when a component failure is detected.
The Juniper SRX Services Gateway must reveal log messages or management console alerts only to the ISSO, ISSM, and SA roles).
The layer 2 switch must have Storm Control configured on all host-facing switch ports.
The Juniper SRX Services Gateway VPN must use Internet Key Exchange (IKE) for IPsec VPN Security Associations (SAs).
If IDPS inspection is performed separately from the Juniper SRX Services Gateway VPN device, the VPN must route sessions to an IDPS for inspection.
The Juniper SRX Services Gateway VPN must not accept certificates that have been revoked when using PKI for authentication.
The Juniper SRX Services Gateway VPN must specify Perfect Forward Secrecy (PFS).
The Juniper SRX Services Gateway VPN must use Encapsulating Security Payload (ESP) in tunnel mode.
The layer 2 switch must have IGMP or MLD Snooping configured on all VLANs
The layer 2 switch must implement Rapid STP where VLANs span multiple switches with redundant links.
The layer 2 switch must enable Unidirectional Link Detection (UDLD) to protect against one-way connections.
The layer 2 switch must have all trunk links enabled statically.
The layer 2 switch must have all disabled switch ports assigned to an unused VLAN.
The layer 2 switch must not have the default VLAN assigned to any host-facing switch ports.
The layer 2 switch must have the default VLAN pruned from all trunk ports that do not require it.
The layer 2 switch must not use the default VLAN for management traffic.
The layer 2 switch must have all user-facing or untrusted ports configured as access switch ports.
The layer 2 switch must have the native VLAN assigned to an ID other than the default VLAN for all 802.1q trunk links.
The layer 2 switch must not have any switch ports assigned to the native VLAN.
The layer 2 switch must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.
The Mainframe Product must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.
The MobileIron Core v10 server must be configured to have at least one user in the following Administrator roles: Server primary administrator, security configuration administrator, device user group administrator, auditor.
Prompts to convert older databases must be enforced.
Microsoft Android 11 must be configured to not allow passwords that include more than two repeating or sequential characters.
Microsoft Android 11 must be configured to enforce an application installation policy by specifying one or more authorized application repositories, including [selection: DOD-approved commercial app repository, EMM server, mobile application store].
Microsoft Android 11 allow list must be configured to not include applications with the following characteristics: - Back up MD data to non-DOD cloud servers (including user and application access to cloud backup services);- Transmit MD diagnostic data to non-DOD servers;- Voice assistant application if available when MD is locked;- Voice dialing application if available when MD is locked;- Allows synchronization of data or applications between devices associated with user; and- Allows unencrypted (or encrypted but not FIPS 140-2/FIPS 140-3 validated) data sharing with other MDs or printers.
Microsoft Android 11 must be configured to disable Bluetooth or configured via User Based Enforcement (UBE) to allow Bluetooth for only Headset Profile (HSP), HandsFree Profile (HFP), and Serial Port Profile (SPP).
Microsoft Android 11 must be configured to disable trust agents. Note: This requirement is not applicable (NA) for specific biometric authentication factors included in the product's Common Criteria evaluation.
Microsoft Android 11 must be configured to disable multi-user modes.
Microsoft Android 11 must be configured to enable audit logging.
Microsoft Android 11 users must complete required training.
Microsoft Android 11 must be configured to enforce that Wi-Fi Sharing is disabled.
Microsoft Android 11 must have the DOD root and intermediate PKI certificates installed.
Microsoft Android 11 must allow only the administrator (EMM) to install/remove DOD root and intermediate PKI certificates.
The Microsoft Android 11 Work Profile must be configured to prevent users from adding personal email accounts to the work email app.
Microsoft Android 11 Work Profile must be configured to enforce the system application disable list.
Microsoft Android 11 must be provisioned as a fully managed device and configured to create a work profile.
Microsoft Android 11 Work Profile must be configured to disable automatic completion of work space internet browser text input.
Microsoft Android 11 Work Profile must be configured to disable the autofill services.
Microsoft Android 11 must be configured to disallow configuration of date and time.
Microsoft Android 11 devices must have the latest available Microsoft Android 11 operating system installed.
Microsoft Android 11 devices must be configured to disable the use of third-party keyboards.
Microsoft Android 11 devices must be configured to enable Common Criteria Mode (CC Mode).
Motorola Solutions Android 11 must be configured to not allow passwords that include more than two repeating or sequential characters.
Motorola Solutions Android 11 must be configured to enforce an application installation policy by specifying one or more authorized application repositories, including [selection: DoD-approved commercial app repository, EMM server, mobile application store].
Motorola Solutions Android 11 must be configured to enforce an application installation policy by specifying an application allow list that restricts applications by the following characteristics: [selection: list of digital signatures, cryptographic hash values, names, application version].
Motorola Solutions Android 11 allow list must be configured to not include applications with the following characteristics:
- Back up MD data to non-DoD cloud servers (including user and application access to cloud backup services);
- Transmit MD diagnostic data to non-DoD servers;
- Voice assistant application if available when MD is locked;
- Voice dialing application if available when MD is locked;
- Allows synchronization of data or applications between devices associated with user; and
- Allows unencrypted (or encrypted but not FIPS 140-2 validated) data sharing with other MDs or printers.
Motorola Solutions Android 11 must be configured to disable Bluetooth or configured via User Based Enforcement (UBE) to allow Bluetooth for only Headset Profile (HSP), HandsFree Profile (HFP), and Serial Port Profile (SPP).
Motorola Solutions Android 11 must be configured to disable trust agents.
Note: This requirement is not applicable (NA) for specific biometric authentication factors included in the product's Common Criteria evaluation.
Motorola Solutions Android 11 must allow only the Administrator (EMM) to perform the following management function: Enable/disable location services.
Motorola Solutions Android 11 must be configured to enable audit logging.
Motorola Solutions Android 11 users must complete required training.
Motorola Solutions Android 11 must be configured to enforce that Wi-Fi Sharing is disabled.
Motorola Solutions Android 11 must have the DoD root and intermediate PKI certificates installed.
Motorola Solutions Android 11 must allow only the administrator (EMM) to install/remove DoD root and intermediate PKI certificates.
Motorola Solutions Android 11 work profile must be configured to enforce the system application disable list.
Motorola Solutions Android 11 must be configured to disallow configuration of date and time.
Motorola Solutions Android 11 devices must have the latest available Motorola Solutions Android 11 operating system installed.
Motorola Solutions Android 11 devices must be configured to disable the use of third-party keyboards.
Prompts to convert older databases must be enforced.
Microsoft Android 11 allow list must be configured to not include applications with the following characteristics:
- Back up MD data to non-DOD cloud servers (including user and application access to cloud backup services);
- Transmit MD diagnostic data to non-DOD servers;
- Voice assistant application if available when MD is locked;
- Voice dialing application if available when MD is locked;
- Allows synchronization of data or applications between devices associated with user; and
- Allows unencrypted (or encrypted but not FIPS 140-2/FIPS 140-3 validated) data sharing with other MDs or printers.
Microsoft Android 11 must be configured to disable trust agents.
Note: This requirement is not applicable (NA) for specific biometric authentication factors included in the product's Common Criteria evaluation.
Automatic republish to web pages must be disallowed.
AutoRepublish Warning Alert must be provided.
Corrupt workbook options must be disallowed.
The AutoRepublish warning alert must be provided.
Exchange must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.
Exchange Public Folder Stores must mount at startup.
Offline Mode capability to cache queries for offline mode must be configured.
The InfoPath APTCA Assembly Allowable List must be enforced.
The Help Improve Proofing Tools feature for Office must be configured.
A mix of policy and user locations for Office Products must be disallowed.
Smart Documents use of Manifests in Office must be disallowed.
Legacy format signatures must be enabled.
External Signature Services Menu for Office must be suppressed.
Inclusion of document properties for PDF and XPS output must be disallowed.
Blogging entries created from inside Office products must be configured for SharePoint only.
The Enable Updates and Disable Updates options in the UI must be hidden from users.
When using the Office Feedback tool, the ability to include a screenshot must be disabled.
The ability to run unsecure Office apps must be disabled.
The Office Telemetry Agent must be configured to obfuscate the file name, file path, and title of Office documents before uploading telemetry data to the shared folder.
Permit download of content from safe zones must be configured.
Access restriction settings for published calendars must be configured.
Recipients of sent email must be unable to be added to the safe senders list.
IE Trusted Zones assumed trusted must be blocked.
Trusted add-ins behavior for email must be configured.
Disabling download full text of articles as HTML must be configured.
Hyperlinks in suspected phishing email messages must be disallowed.
Junk Mail UI must be configured.
Internet with Safe Zones for Picture Download must be disabled.
Intranet with Safe Zones for automatic picture downloads must be configured.
External content and pictures in HTML email must be displayed.
Attachments using generated name for secure temporary folders must be configured.
Automatic download content for email in Safe Senders list must be disallowed.
Outlook must be enforced as the default email, calendar, and contacts program.
Outlook Security Mode must be configured to use Group Policy settings.
Publishing to a Web Distributed and Authoring (DAV) server must be prevented.
Publishing calendars to Office Online must be prevented.
Read EMail as plain text must be enforced.
Read signed email as plain text must be enforced.
Level of calendar details that a user can publish must be restricted.
Upload method for publishing calendars to Office Online must be restricted.
Automatic sending s/Mime receipt requests must be disallowed.
The Help Improve Proofing Tools feature for Office must be configured.
A mix of policy and user locations for Office Products must be disallowed.
Smart Documents use of Manifests in Office must be disallowed.
Inclusion of document properties for PDF and XPS output must be disallowed.
When using the Office Feedback tool, the ability to include a screenshot must be disabled.
The ability to run unsecure Office web add-ins and Catalogs must be disabled.
The Office Telemetry Agent must be configured to obfuscate the file name, file path, and title of Office documents before uploading telemetry data to the shared folder.
The ability to send personal information to Office must be disabled.
Blogging entries created from inside Office products must be configured for Sharepoint only.
Upload of document templates to Office Online must be prevented.
Key Usage Filtering must be allowed.
OneDrive must only allow synchronizing of accounts for DoD organization instances.
Recipients of sent email must be unable to be added to the safe sender's list.
IE Trusted Zones assumed 'trusted' must be blocked.
Trusted add-ins behavior for eMail must be configured.
Hyperlinks in suspected phishing e-mail messages must be disallowed.
External content and pictures in HTML eMail must be displayed.
Automatically configure user profile based on Active Directory primary SMTP address must be enforced.
All signed messages as clear signed messages must be configured.
Trust EMail from senders in receiver's contact list must be enforced.
Outlook Rich Text options must be set for converting to plain text format.
Default message format must be set to use Plain Text.
Outlook must be configured not to prompt users to choose security settings if default settings fail.
Replies or forwards to signed/encrypted messages must be signed/encrypted.
Check e-mail addresses against addresses of certificates being used must be disallowed.
Text in Outlook that represents Internet and network paths must not be automatically turned into hyperlinks.
Send all signed messages as clear signed messages must be configured.
Trust EMail from senders in receivers contact list must be enforced.
Replies or forwards to signed/encrypted messages must be signed/encrypted.
Publishing to a Web Distributed and Authoring (DAV) server must be prevented.
Access restriction settings for published calendars must be configured.
Outlook Security Mode must be configured to use Group Policy settings.
Trusted add-ins behavior for email must be configured.
Send all signed messages as clear signed messages must be configured.
Automatic sending s/Mime receipt requests must be disallowed.
External content and pictures in HTML email must be displayed.
Permit download of content from safe zones must be configured.
IE Trusted Zones assumed trusted must be blocked.
Internet with Safe Zones for Picture Download must be disabled.
Intranet with Safe Zones for automatic picture downloads must be configured.
Hyperlinks in suspected phishing email messages must be disallowed.
Disabling download full text of articles as HTML must be configured.
The default message format must be set to use Plain Text.
Outlook Rich Text options must be set for converting to plain text format.
Text in Outlook that represents internet and network paths must not be automatically turned into hyperlinks.
Hidden markup options must be visible.
The configuration for Slide Update with counterparts must be disallowed.
The configuration for Slide Update with counterparts must be disallowed.
The Microsoft SCOM server must back up audit records at least every seven days onto a different system or system component than the system or component being audited.
The Microsoft SCOM server must be running Windows operating system that supports modern security features such as virtualization based security.
SCOM unsealed management packs must be backed up regularly.
If a certificate is used for the SCOM web console, this certificate must be generated by a DoD CA or CA approved by the organization.
SharePoint must maintain and support the use of security attributes with stored information.
SharePoint must identify data type, specification, and usage when transferring information between different security domains so policy restrictions may be applied.
SharePoint must reject or delay, as defined by the organization, network traffic generated above configurable traffic volume thresholds.
The SharePoint farm service account (database access account) must be configured with minimum privileges in Active Directory (AD).
The SharePoint farm service account (database access account) must be configured with minimum privileges on the SQL server.
The SharePoint setup account must be configured with the minimum privileges in Active Directory.
The SharePoint setup account must be configured with the minimum privileges on the SQL server.
The SharePoint setup account must be configured with the minimum privileges for the local server.
A secondary SharePoint site collection administrator must be defined when creating a new site collection.
SharePoint-specific malware (i.e. anti-virus) protection software must be integrated and configured.
SharePoint server access to the Online Web Part Gallery must be configured for limited access.
The SharePoint farm service account (database access account) must be configured with the minimum privileges for the local server.
The SQL Server Browser service must be disabled if its use is not necessary..
Forwarders on an authoritative Windows 2012 DNS Server, if enabled for external resolution, must only forward to either an internal, non-AD-integrated DNS server or to the DoD Enterprise Recursive Services (ERS).
The Windows 2012 DNS Server with a caching name server role must restrict recursive query responses to only the IP addresses and IP address ranges of known supported clients.
The Windows 2012 DNS Server with a caching name server role must be secured against pollution by ensuring the authenticity and integrity of queried records.
The Windows 2012 DNS Server must implement cryptographic mechanisms to detect changes to information during transmission unless otherwise protected by alternative physical safeguards, such as, at a minimum, a Protected Distribution System (PDS).
The Windows 2012 DNS Servers zone files must have NS records that point to active name servers authoritative for the domain specified in that record.
The Windows 2012 DNS Server must be configured to enable DNSSEC Resource Records.
The Windows 2012 DNS Servers zone database files must not be accessible for edit/write by users and/or processes other than the Windows 2012 DNS Server service account and/or the DNS database administrator.
The Windows 2012 DNS Server must implement internal/external role separation.
The Windows 2012 DNS Server authoritative for local zones must only point root hints to the DNS servers that host the internal root domain.
The Windows 2012 DNS Servers zone files must not include resource records that resolve to a fully qualified domain name residing in another zone.
The Windows 2012 DNS Servers zone files must not include CNAME records pointing to a zone with lesser security for more than six months.
Non-routable IPv6 link-local scope addresses must not be configured in any zone.
AAAA addresses must not be configured in a zone for hosts that are not IPv6-aware.
The Windows 2012 DNS Servers IP address must be statically defined and configured locally on the server.
The Windows 2012 DNS Server must return data information in responses to internal name/address resolution queries.
The Windows 2012 DNS Server must use DNSSEC data within queries to confirm data origin to DNS resolvers.
The Windows 2012 DNS Server must, when a component failure is detected, activate a notification to the system administrator.
The Windows 2012 DNS Server must perform verification of the correct operation of security functions: upon system start-up and/or restart; upon command by a user with privileged access; and/or every 30 days.
The Windows 2012 DNS Server must be configured to record, and make available to authorized personnel, who added/modified/deleted DNS zone information.
The Windows 2012 DNS Server must, in the event of an error validating another DNS servers identity, send notification to the DNS administrator.
The Windows 2012 DNS Server logging criteria must only be configured by the ISSM or individuals appointed by the ISSM.
The validity period for the RRSIGs covering the DS RR for a zones delegated children must be no less than two days and no more than one week.
The Windows DNS name servers for a zone must be geographically dispersed.
A warning before printing that the document contains tracking changes must be provided.
Word must be configured to warn when opening a document with custom XML markup.
If the network device uses role-based access control, the network device must enforce organization-defined role-based access control policies over defined subjects and objects.
The network device must be configured to synchronize internal information system clocks using redundant authoritative time sources.
Network devices performing maintenance functions must restrict use of these functions to authorized personnel only.
If the network device uses mandatory access control, the network device must enforce organization-defined mandatory access control policies over all subjects and objects.
The network device must generate log records for a locally developed list of auditable events
The network device must enforce access restrictions associated with changes to the system components.
The network device must be configured to conduct backups of system level information contained in the information system when changes occur.
The network device must support organizational requirements to conduct backups of information system documentation, including security-related documentation, when changes occur or weekly, whichever is sooner.
The network device must obtain its public key certificates from an appropriate certificate policy through an approved service provider.
The network device must be running an operating system release that is currently supported by the vendor.
The network device must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.
Nutanix AOS must prevent the use of dictionary words for passwords.
Nutanix AOS must enforce a delay of at least four seconds between logon prompts following a failed logon attempt.
Nutanix AOS must be configured to run SCMA daily.
Nutanix AOS must define default permissions for all authenticated users in such a way that the user can only read and modify their own files.
Nutanix AOS must not allow an unattended or automatic logon to the system.
Nutanix AOS must be configured so that all local interactive user home directories have mode "0750" or less permissive.
Nutanix AOS must enable an application firewall, if available.
The Node Manager account password associated with the installation of OHS must be in accordance with DoD guidance for length, complexity, etc.
OHS must have Entity tags (ETags) disabled.
The SecureListener property of the Node Manager configured to support OHS must be enabled for secure communication.
The ListenAddress property of the Node Manager configured to support OHS must match the CN of the certificate used by Node Manager.
The AuthenticationEnabled property of the Node Manager configured to support OHS must be configured to enforce authentication.
The KeyStores property of the Node Manager configured to support OHS must be configured for secure communication.
The CustomIdentityKeyStoreFileName property of the Node Manager configured to support OHS must be configured for secure communication.
The CustomIdentityKeyStorePassPhrase property of the Node Manager configured to support OHS must be configured for secure communication.
The CustomIdentityAlias property of the Node Manager configured to support OHS must be configured for secure communication.
The CustomIdentityPrivateKeyPassPhrase property of the Node Manager configured to support OHS must be configured for secure communication.
The listen-address element defined within the config.xml of the OHS Standalone domain that supports OHS must be configured for secure communication.
The listen-port element defined within the config.xml of the OHS Standalone Domain must be configured for secure communication.
The WLST_PROPERTIES environment variable defined for the OHS WebLogic Scripting Tool must be updated to reference an appropriate trust store so that it can communicate with the Node Manager supporting OHS.
The WLST_PROPERTIES environment variable defined for the Fusion Middleware WebLogic Scripting Tool must be updated to reference an appropriate trust store so that it can communicate with the Node Manager supporting OHS.
OHS must limit access to the Dynamic Monitoring Service (DMS).
OHS must have the AllowOverride directive set properly.
OHS must be set to evaluate deny directives first when considering whether to serve a file.
OHS must deny all access by default when considering whether to serve a file.
The OHS instance installation must not contain an .htaccess file.
The OHS instance configuration must not reference directories that contain an .htaccess file.
OHS must have the HostnameLookups directive enabled.
OHS must have the ServerAdmin directive set properly.
OHS must restrict access methods.
The OHS htdocs directory must not contain any default files.
OHS must have the SSLSessionCacheTimeout directive set properly.
OHS must have the RewriteEngine directive enabled.
OHS must have the RewriteOptions directive set properly.
OHS must have the RewriteLogLevel directive set to the proper log level.
OHS must have the RewriteLog directive set properly.
All accounts installed with the web server software and tools must have passwords assigned and default passwords changed.
A production OHS Installation must prohibit the installation of a compiler.
A public OHS installation, if hosted on the NIPRNet, must be isolated in an accredited DoD DMZ Extension.
A private OHS installation must be located on a separate controlled access subnet.
The version of the OHS installation must be vendor-supported.
OHS must be certified with accompanying Fusion Middleware products.
OHS tools must be restricted to the web manager and the web managers designees.
All utility programs, not necessary for operations, must be removed or disabled.
The OHS htpasswd files (if present) must reflect proper ownership and permissions.
A public OHS installation must limit email to outbound only.
OHS content and configuration files must be part of a routine backup program.
OHS must be segregated from other services.
OHS must have all applicable patches (i.e., CPUs) applied/documented (OEM).
A private OHS list of CAs in a trust hierarchy must lead to an authorized DoD PKI Root CA.
OHS must have the ScoreBoardFile directive disabled.
The OHS document root directory must not be on a network share.
The OHS server root directory must not be on a network share.
Symbolic links must not be used in the web content directory tree.
OHS administration must be performed over a secure path or at the local console.
OHS must not contain any robots.txt files.
OHS must prohibit anonymous FTP user access to interactive scripts.
The OHS DocumentRoot directory must be in a separate partition from the OHS ServerRoot directory.
The OHS DocumentRoot directory must be on a separate partition from OS root partition.
Remote authors or content providers must have all files scanned for viruses and malicious code before uploading files to the Document Root directory.
A public OHS server must use TLS if authentication is required to host web sites.
OHS hosted web sites must utilize ports, protocols, and services according to PPSM guidelines.
OHS must not have the directive PlsqlDatabasePassword set in clear text.
Oracle WebLogic must enforce the organization-defined time period during which the limit of consecutive invalid access attempts by a user is counted.
Oracle WebLogic must automatically lock accounts when the maximum number of unsuccessful login attempts is exceeded for an organization-defined time period or until the account is unlocked by an administrator.
Oracle WebLogic must utilize automated mechanisms to prevent program execution on the information system.
Oracle WebLogic must utilize NSA-approved cryptography when protecting classified compartmentalized data.
Prisma Cloud Compute must be configured to send events to the hosts' syslog.
The configuration integrity of the container platform must be ensured and vulnerabilities policies must be configured.
Oracle WebLogic must be integrated with a tool to monitor audit subsystem failure notification information that is sent out (e.g., the recipients of the message and the nature of the failure).
Oracle WebLogic must be managed through a centralized enterprise tool.
Oracle WebLogic must be integrated with a tool to implement multi-factor user authentication.
The Riverbed NetProfiler must be configured to authenticate each administrator prior to authorizing privileges based on roles.
The Riverbed NetProfiler must be configured to synchronize internal information system clocks using redundant authoritative time sources.
The Riverbed NetProfiler must be configured to use an authentication server to authenticate users prior to granting administrative access.
The Riverbed NetProfiler must be configured to obtain its public key certificates from an appropriate certificate policy through an approved service provider.
The Riverbed NetProfiler must be configured to run an operating system release that is currently supported by the vendor.
The Riverbed NetProfiler must be configured to conduct backups of system-level information and system documentation, including security-related documentation, when changes occur or weekly, whichever is sooner.
Rancher MCM must allocate audit record storage and generate audit records associated with events, users, and groups.
The multicast Designated Router (DR) must be configured to increase the shortest-path tree (SPT) threshold or set it to infinity to minimalize source-group (S, G) state within the multicast topology where Any Source Multicast (ASM) is deployed.
The BGP router must be configured to use its loopback address as the source address for iBGP peering sessions.
The MPLS router must be configured to have TTL Propagation disabled.
The PE router providing Virtual Private LAN Services (VPLS) must be configured to have all attachment circuits defined to the virtual forwarding instance (VFI) with the globally unique VPN ID assigned for each customer VLAN.
The PE router must be configured to enforce the split-horizon rule for all pseudowires within a Virtual Private LAN Services (VPLS) bridge domain.
The Multicast Source Discovery Protocol (MSDP) router must be configured to use its loopback address as the source address when originating MSDP traffic.
The router must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.
The router must be configured to implement message authentication for all control plane protocols.
The BGP router must be configured to use a unique key for each autonomous system (AS) that it peers with.
The router must be configured to use keys with a duration not exceeding 180 days for authenticating routing protocol messages.
The router must be configured to advertise a hop limit of at least 32 in Router Advertisement messages for IPv6 stateless auto-configuration deployments.
The router must not be configured to use IPv6 Site Local Unicast addresses.
The perimeter router must be configured to suppress Router Advertisements on all external IPv6-enabled interfaces.
Riverbed Optimization System (RiOS) must be configured to synchronize internal information system clocks with the primary and secondary time sources located in different geographic regions using redundant authoritative time sources.
Riverbed Optimization System (RiOS) must enable the password authentication control policy to ensure password complexity controls and other password policy requirements are enforced.
Riverbed Optimization System (RiOS) must employ automated mechanisms to centrally manage authentication settings.
Riverbed Optimization System (RiOS) must employ automated mechanisms to centrally apply authentication settings.
Riverbed Optimization System (RiOS) must employ automated mechanisms to centrally verify authentication settings.
Riverbed Optimization System (RiOS) must back up the system configuration files when configuration changes are made to the device.
Riverbed Optimization System (RiOS) performing maintenance functions must restrict use of these functions to authorized personnel only.
Riverbed Optimization System (RiOS) must obtain its public key certificates from an appropriate certificate policy through an approved service provider.
Riverbed Optimization System (RiOS) must generate an alert that can be sent to security personnel when threats identified by authoritative sources (e.g., CTOs) and IAW with CJCSM 6510.01B occur.
The SDN controller must be configured to be deployed as a cluster and on separate physical hosts.
The SDN Controller must be configured to notify the forwarding device to either drop the packet or make an entry in the flow table for a received packet that does not match any flow table entries.
SDN controller must be configured to forward traffic based on security requirements.
The SDN controller must be configured to enable multi-tenant virtual networks to be fully isolated from one another.
The SDN controller must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.
Southbound API control plane traffic must traverse an out-of-band path or be encrypted using a FIPS-validated cryptographic module.
Northbound API traffic must traverse an out-of-band path or be encrypted using a FIPS-validated cryptographic module.
Southbound API management plane traffic for provisioning and configuring virtual network elements within the SDN infrastructure must traverse an out-of-band path or be encrypted using a using a FIPS-validated cryptographic module.
Southbound API management plane traffic for configuring SDN parameters on physical network elements must be encrypted using a FIPS-validated cryptographic module.
Physical SDN controllers and servers hosting SDN applications must reside within the management network with multiple paths that are secured by a firewall to inspect all ingress traffic.
SDN-enabled routers and switches must provide link state information to the SDN controller to create new forwarding decisions for the network elements.
Quality of service (QoS) must be implemented on the underlying IP network to provide preferred treatment for traffic between the SDN controllers and SDN-enabled switches and hypervisors.
SDN controllers must be deployed as clusters and on separate physical hosts to eliminate single point of failure.
Physical devices hosting an SDN controller must be connected to two switches for high-availability.
SDN-enabled routers and switches must rate limit the amount of unknown data plane packets that are punted to the SDN controller.
All Virtual Extensible Local Area Network (VXLAN) enabled switches must be configured with the appropriate VXLAN network identifier (VNI) to ensure VMs can send and receive all associated traffic for their Layer 2 domain.
Virtual Extensible Local Area Network (VXLAN) identifiers must be mapped to the appropriate VLAN identifiers.
The proper multicast group for each Virtual Extensible Local Area Network (VXLAN) identifier must be mapped to the appropriate virtual tunnel endpoint (VTEP) so the VTEP will join the associated multicast groups.
The virtual tunnel endpoint (VTEP) must be dual-homed to two physical network nodes.
A secondary IP address must be specified for the virtual tunnel endpoint (VTEP) loopback interface when Virtual Extensible Local Area Network (VXLAN) enabled switches are deployed as a multi-chassis configuration.
Two or more edge gateways must be deployed connecting the network virtualization platform (NVP) and the physical network.
Virtual edge gateways must be deployed across multiple hypervisor hosts.
The virtual edge gateways must be deployed with routing adjacencies established with two or more physical routers.
The SEL-2740S must be configured to mitigate the risk of ARP cache poisoning attacks.
The SEL-2740S must be configured to capture all packets without flow rule match criteria.
The SEL-2740S must be configured with backup flows for all host and switch flows to ensure proper failover scheme is in place for the network.
The SEL-2740S must be configured to forward only frames from allowed network-connected endpoint devices.
The SEL-2740S must be configured to maintain internal system clocks with a backup authoritative time server.
The SEL-2740S must be adopted by OTSDN Controller(s) and obtain its public key certificates from an appropriate certificate policy through an approved service provider.
The SEL-2740S must be configured to send log data to a syslog server for the purpose of forwarding alerts to the administrators and the ISSO.
The SEL-2740S must employ automated mechanisms to assist in the tracking of security incidents.
Samsung Android must be configured to not allow passwords that include more than two repeating or sequential characters.
Samsung Android must be configured to enforce an application installation policy by specifying one or more authorized application repositories, including DoD-approved commercial app repository, management tool server, or mobile application store.
Samsung Android Work Environment must be configured to enforce an application installation policy by specifying an application allowlist that restricts applications by the following characteristics: names.
The Samsung Android Work Environment allowlist must be configured to not include applications with the following characteristics:
- back up MD data to non-DoD cloud servers (including user and application access to cloud backup services);
- transmit MD diagnostic data to non-DoD servers;
- voice assistant application if available when MD is locked;
- voice dialing application if available when MD is locked;
- allows synchronization of data or applications between devices associated with user; and
- allows unencrypted (or encrypted but not FIPS 140-2 validated) data sharing with other MDs or printers.
Samsung Android must be configured to disable all Bluetooth profiles except for HSP (Headset Profile), HFP (HandsFree Profile), SPP (Serial Port Profile), A2DP (Advanced Audio Distribution Profile), AVRCP (Audio/Video Remote Control Profile), and PBAP (Phone Book Access Profile).
Samsung Android must be configured to not display the following (Work Environment) notifications when the device is locked: all notifications.
Samsung Android must be configured to disable trust agents.
NOTE: This requirement is not applicable (NA) for specific biometric authentication factors included in the product Common Criteria evaluation.
Samsung Android must be configured to disable Face Recognition.
NOTE: This requirement is not applicable (NA) for specific biometric authentication factors included in the product Common Criteria evaluation.
Samsung Android Work Environment must be configured to disable exceptions to the access control policy that prevents application processes, groups of application processes from accessing all, private data stored by other application processes, groups of application processes.
- Disable Move files to personal
Samsung Android Work Environment must be configured to disable exceptions to the access control policy that prevents application processes, groups of application processes from accessing all, private data stored by other application processes, groups of application processes.
- Disable Copy and Paste data
Samsung Android Work Environment must be configured to disable exceptions to the access control policy that prevents application processes, groups of application processes from accessing all, private data stored by other application processes, groups of application processes.
- Disable Sync Calendar to personal
Samsung Android must be configured to disable multi-user modes (tablets only).
The Samsung Android Work Environment must be configured to prevent users from adding personal email accounts to the work email app.
Samsung Android Personal Environment must be configured to enforce the system application disable list.
Samsung Android Work Environment must be configured to enforce the system application disable list.
Samsung Android must be configured to enable audit logging.
Samsung Android must be enrolled as a COPE/COBO device.
Samsung Android device users must complete required training.
Samsung Android must be configured to enable Knox CC Mode.
Samsung Android must be configured to disallow configuration of Date Time.
Samsung Android must be configured to enforce a USB host mode exception list.
NOTE: This configuration allows DeX mode (with input devices), which is DoD-approved for use.
Samsung Android Work Environment must be configured to enforce that Share Via List is disabled.
Samsung Android must be configured to disallow outgoing beam.
Samsung Android Work Environment must be configured to enforce that Wi-Fi Sharing is disabled.
Samsung Android Work Environment must be configured to enable Certificate Revocation checking.
Samsung Android Work Environment must have the DoD root and intermediate PKI certificates installed.
Splunk Enterprise must use TCP for data transmission.
Splunk Enterprise must be configured to notify the System Administrator (SA) and Information System Security Officer (ISSO), at a minimum, when an attack is detected on multiple devices and hosts within its scope of coverage.
Splunk Enterprise forwarders must be configured with Indexer Acknowledgement enabled.
Samsung Android Work Environment must be configured to enable audit logging.
Samsung Android Work Environment must be configured to disable the autofill services.
Samsung Android Work Environment must allow only the Administrator (management tool) to perform the following management function: install/remove DoD root and intermediate PKI certificates.
The Samsung Android device must have the latest available Samsung Android operating system (OS) installed.
The Samsung SDS EMM must be configured to communicate the following commands to the MDM Agent: read audit logs kept by the MD.
The Samsung SDS EMM must be configured to have at least one user in the following Administrator roles: Server primary administrator, security configuration administrator, device user group administrator, auditor.
The Samsung SDS EMM server must be maintained at a supported version.
The reverse proxy Symantec ProxySG providing intermediary services for FTP must inspect inbound FTP communications traffic for protocol compliance and protocol anomalies.
Symantec ProxySG providing intermediary services for FTP must inspect outbound FTP communications traffic for protocol compliance and protocol anomalies.
Symantec ProxySG providing intermediary services for HTTP must inspect inbound HTTP traffic for protocol compliance and protocol anomalies.
Symantec ProxySG providing intermediary services for HTTP must inspect outbound HTTP traffic for protocol compliance and protocol anomalies.
Samsung Android must be enrolled as a COBO device.
Samsung Android must be configured to not allow passwords that include more than four repeating or sequential characters.
Samsung Android must be configured to disable all Bluetooth profiles except for HSP (Headset Profile), HFP (Hands-Free Profile), SPP (Serial Port Profile), A2DP (Advanced Audio Distribution Profile), AVRCP (Audio/Video Remote Control Profile), and PBAP (Phone Book Access Profile).
Samsung Android must be configured to disallow configuration of the device's date and time.
Samsung Android must have the DOD root and intermediate PKI certificates installed.
Samsung Android must be configured to not allow installation of applications with the following characteristics:
- Back up MD data to non-DOD cloud servers (including user and application access to cloud backup services);
- Transmit MD diagnostic data to non-DOD servers;
- Voice assistant application if available when MD is locked;
- Voice dialing application if available when MD is locked;
- Allows synchronization of data or applications between devices associated with user; and
- Allows unencrypted (or encrypted but not FIPS 140-2 validated) data sharing with other MDs or printers.
Samsung Android must be configured to prevent users from adding personal email accounts to the work email app.
Samsung Android must allow only the Administrator (management tool) to perform the following management function: Install/remove DOD root and intermediate PKI certificates.
Samsung Android must be configured to enforce an application installation policy by specifying one or more authorized application repositories, including DOD-approved commercial app repository, management tool server, or mobile application store.
Samsung Android must be configured to enable Common Criteria (CC) mode.
Samsung Android must be enrolled as a COPE device.
Samsung Android's Work profile must have the DOD root and intermediate PKI certificates installed.
Samsung Android's Work profile must be configured to not allow installation of applications with the following characteristics:
- Back up MD data to non-DOD cloud servers (including user and application access to cloud backup services);
- Transmit MD diagnostic data to non-DOD servers;
- Voice assistant application if available when MD is locked;
- Voice dialing application if available when MD is locked;
- Allows synchronization of data or applications between devices associated with user; and
- Allows unencrypted (or encrypted but not FIPS 140-2 validated) data sharing with other MDs or printers.
Samsung Android's Work profile must be configured to enable audit logging.
Samsung Android's Work profile must be configured to prevent users from adding personal email accounts to the work email app.
Samsung Android's Work profile must allow only the Administrator (management tool) to perform the following management function: Install/remove DOD root and intermediate PKI certificates.
Samsung Android's Work profile must be configured to enable Common Criteria (CC) mode.
Tanium endpoint files must be excluded from on-access antivirus actions.
The Tanium Client Deployment Tool (CDT) must not be configured to use the psexec method of deployment.
Tanium endpoint files must be protected from file encryption actions.
Tanium endpoint files must be excluded from host-based intrusion prevention intervention.
Tanium Server files must be excluded from on-access antivirus actions.
Tanium Server files must be protected from file encryption actions.
Tanium Server files must be excluded from host-based intrusion prevention intervention.
Symantec ProxySG must be configured to synchronize internal information system clocks with the primary and secondary time sources located in different geographic regions using redundant authoritative time sources.
Symantec ProxySG must employ automated mechanisms to centrally verify authentication settings.
Accounts for device management must be configured on the authentication server and not on Symantec ProxySG itself, except for the account of last resort.
Symantec ProxySG must use Role-Based Access Control (RBAC) to assign privileges to users for access to files and functions.
Symantec ProxySG must employ automated mechanisms to centrally apply authentication settings.
Symantec ProxySG must support organizational requirements to conduct backups of system level information contained in the ProxySG when changes occur or weekly, whichever is sooner.
Symantec ProxySG must obtain its public key certificates from an appropriate certificate policy through an approved service provider.
Symantec ProxySG must configure the maintenance and health monitoring to send an alarm when a critical condition occurs for a component.
Tanium Client processes must be excluded from On-Access scan.
Tanium Server processes must be excluded from On-Access scan.
Tanium Client directory and subsequent files must be excluded from On-Access scan.
Tanium endpoint files must be excluded from host-based intrusion prevention system (HIPS) intervention.
Tanium Client processes must be excluded from on-access scan.
Tanium Client directory and subsequent files must be excluded from on-access scan.
Tanium Server directory and subsequent files must be excluded from On-Access scan.
The TippingPoint SMS must be configured to synchronize internal information system clocks using redundant authoritative time sources.
The TippingPoint SMS must be configured to use an authentication server for the purpose of authenticating users prior to granting administrative access and to enforce access restrictions.
The TippingPoint SMS must be configured to conduct backups of system level information contained in the information system when changes occur.
The TippingPoint SMS must support organizational requirements to conduct backups of information system documentation, including security-related documentation, when changes occur or weekly, whichever is sooner.
The TippingPoint SMS must obtain its public key certificates from an appropriate certificate policy through an approved service provider.
Tanium Server directory and subsequent files must be excluded from on-access scan.
Tanium Server processes must be excluded from on-access scan.
The UEM Agent must record the reference identifier of the UEM Server during the enrollment process.
The UEM Agent must perform the following functions:
-enroll in management
-configure whether users can unenroll from management
-configure periodicity of reachability events.
The UEM Agent must be configured to perform one of the following actions upon an attempt to unenroll the mobile device from management:
-prevent the unenrollment from occurring
-wipe the device to factory default settings
-wipe the work profile with all associated applications and data.
The TippingPoint SMS must be running an operating system release that is currently supported by the vendor.
The TippingPoint SMS must automatically generate audit records for account changes and actions with containing information needed for analysis of the event that occurred on the SMS and TPS.
The Horizon Agent must only run allowed scripts on user connect.
The Horizon Agent must only run allowed scripts on user disconnect.
The Horizon Agent must only run allowed scripts on user reconnect.
The Horizon Agent must check the entire chain when validating certificates.
The Horizon Agent must set an idle timeout.
The Horizon Agent must block server to client clipboard actions for Blast.
The Horizon Agent must block server to client clipboard actions for PCoIP.
The Horizon Agent must not allow file transfers through HTML Access.
The Horizon Agent must not allow drag and drop for Blast.
The Horizon Agent must not allow drag and drop for PCoIP.
The Horizon Agent must audit clipboard actions for Blast.
The Horizon Agent must audit clipboard actions for PCoIP.
The Horizon Agent desktops must not allow client drive redirection.
The Horizon Agent must block USB mass storage.
The Horizon Client must not connect to servers without fully verifying the server certificate.
The Horizon Client must not show the Log in as current user option.
The UEM server must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.
The UEM server must be configured to allow authorized administrators to read all audit data from audit records on the server.
The NSX-T Manager must be configured to synchronize internal information system clocks using redundant authoritative time sources.
The NSX-T Manager must generate log records for the info level to capture the DoD-required auditable events.
The NSX-T Manager must integrate with either VMware Identity Manager (vIDM) or VMware Workspace ONE Access.
The NSX-T Manager must be configured to conduct backups on an organizationally defined schedule.
The NSX-T Manager must support organizational requirements to conduct backups of information system documentation, including security-related documentation, when changes occur or weekly, whichever is sooner.
The NSX-T Manager must obtain its public key certificates from an approved DoD certificate authority.
The NSX-T Manager must be running a release that is currently supported by the vendor.
The Horizon Client must not ignore certificate revocation problems.
The Horizon Client must require TLS connections.
The Horizon Client must use approved ciphers.
The Horizon Client must not allow command line credentials.
The Horizon Connection Server must reauthenticate users after a network interruption.
The Horizon Connection Server must disconnect users after a maximum of ten hours.
The Horizon Connection Server must disconnect applications after two hours of idle time.
The Horizon Connection Server must discard SSO credentials after 15 minutes.
The Horizon Connection Server must not accept pass-through client credentials.
The Horizon Connection Server must require DoD PKI for client logins.
The Horizon Connection Server must backup its configuration daily.
The Horizon Connection Server Instant Clone domain account must be configured with limited permissions.
The Horizon Connection Server must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.
The Horizon Connection Server must have X-Frame-Options enabled.
The Horizon Connection Server must have Origin Checking enabled.
The Horizon Connection Server must enable the Content Security Policy.
The Horizon Connection Server must enable the proper Content Security Policy directives.
The PCoIP Secure Gateway must be configured with a DoD-issued TLS certificate.
The Horizon Connection Server must not allow unauthenticated access.
The Horizon Connection Server must require CAC reauthentication after user idle timeouts.
The Horizon Connection Server must be configured to restrict USB passthrough access.
The Horizon Connection Server must prevent MIME type sniffing.
The NSX-T Controller cluster must be on separate physical hosts.
The NSX-T Tier-0 Gateway Firewall must configure SpoofGuard to block outbound IP packets that contain illegitimate packet attributes.
The NSX-T Tier-0 Gateway must be configured to implement message authentication for all control plane protocols.
The NSX-T Tier-0 Gateway must be configured to use a unique key for each autonomous system (AS) with which it peers.
The NSX-T Tier-0 Gateway must be configured to use its loopback address as the source address for iBGP peering sessions.
The Workspace ONE UEM server must be configured with an enterprise certificate for signing policies (if function is not automatically implemented during Workspace ONE UEM server install).
The Workspace ONE UEM server must be configured to have at least one user in the following Administrator roles: Server primary administrator, security configuration administrator, device user group administrator, or auditor.
The Workspace ONE UEM server must be maintained at a supported version.
The IPsec VPN Gateway must use Internet Key Exchange (IKE) for IPsec VPN Security Associations (SAs).
The VPN Gateway must not accept certificates that have been revoked when using PKI for authentication.
The Apache web server must have system logging enabled.
The account used to run the Apache web server must not have a valid login shell and password defined.
The Apache web server htpasswd files (if present) must reflect proper ownership and permissions.
STRICT_SERVLET_COMPLIANCE must be set to true.
RECYCLE_FACADES must be set to true.
ALLOW_BACKSLASH must be set to false.
ENFORCE_ENCODING_IN_GET_WRITER must be set to true.
Tomcat users in a management role must be approved by the ISSO.
Hosted applications must be documented in the system security plan.
Connectors must be approved by the ISSO.
Connector address attribute must be set.
Apple iOS/iPadOS 16 must not allow backup to remote systems (managed applications data stored in iCloud).
Apple iOS/iPadOS 16 must not allow backup to remote systems (enterprise books).
Apple iOS/iPadOS 16 must be configured to not allow passwords that include more than four repeating or sequential characters.
Apple iOS/iPadOS 16 must be configured to enforce an application installation policy by specifying one or more authorized application repositories, including [selection: DOD-approved commercial app repository, MDM server, mobile application store].
The Apple iOS/iPadOS 16 allow list must be configured to not include applications with the following characteristics:
- backs up MD data to non-DOD cloud servers (including user and application access to cloud backup services);
- transmits MD diagnostic data to non-DOD servers;
- allows synchronization of data or applications between devices associated with user; and
- allows unencrypted (or encrypted but not FIPS 140-2/FIPS 140-3 validated) data sharing with other MDs or printers.
Apple iOS/iPadOS 16 must be configured to wipe enterprise data and apps upon unenrollment from MDM.
Apple iOS/iPadOS 16 must implement the management setting: Encrypt iTunes backups/Encrypt local backup.
Apple iOS/iPadOS 16 must implement the management setting: not allow messages in an ActiveSync Exchange account to be forwarded or moved to other accounts in the Apple iOS/iPadOS 16 Mail app.
Apple iOS/iPadOS 16 must implement the management setting: Treat AirDrop as an unmanaged destination.
Apple iOS/iPadOS 16 users must complete required training.
Apple iOS/iPadOS 16 must not allow managed apps to write contacts to unmanaged contacts accounts.
Apple iOS/iPadOS 16 must not allow unmanaged apps to read contacts from managed contacts accounts.
Apple iOS/iPadOS 16 must disable copy/paste of data from managed to unmanaged applications.
The EMM system supporting the iOS/iPadOS 16 BYOAD must be configured to initiate autonomous monitoring, compliance, and validation prior to granting the BYOAD access to DOD information and IT resources.
The EMM system supporting the iOS/iPadOS 16 BYOAD must be configured to detect if the BYOAD native security controls are disabled.
The EMM system supporting the iOS/iPadOS 16 BYOAD must be configured to detect if known malicious, blocked, or prohibited applications are installed on the BYOAD (DOD-managed segment only).
The EMM system supporting the iOS/iPadOS 16 BYOAD must be configured to detect if the BYOAD is configured to access nonapproved third-party applications stores (DOD-managed segment only).
The EMM detection/monitoring system must use continuous monitoring of enrolled iOS/iPadOS 16 BYOAD.
The iOS/iPadOS 16 BYOAD must be configured to either disable access to DOD data, IT systems, and user accounts or wipe managed data and apps if the EMM system detects native security controls are disabled.
The iOS/iPadOS 16 BYOAD must be configured to either disable access to DOD data, IT systems, and user accounts or wipe managed data and apps if the EMM system detects the BYOAD device has known malicious, blocked, or prohibited applications or is configured to access nonapproved managed third-party applications stores.
The iOS/iPadOS 16 BYOAD must be configured so that managed data and apps are removed if the device is no longer receiving security or software updates.
The iOS/iPadOS 16 BYOAD must be configured to protect users' privacy, personal information, and applications.
The EMM system supporting the iOS/iPadOS 16 BYOAD must be configured to only wipe managed data and apps and not unmanaged data and apps when the user's access is revoked or terminated, the user no longer has the need to access DOD data or IT, or the user reports a registered device as lost, stolen, or showing indicators of compromise.
The EMM system supporting the iOS/iPadOS 16 BYOAD must be NIAP validated (included on the NIAP list of compliant products or products in evaluation) unless the DOD CIO has granted an approved Exception to Policy (E2P).
The User Agreement must include a description of what personal data and information is being monitored, collected, or managed by the EMM system or deployed agents or tools.
The mobile device used for BYOAD must be NIAP validated.
Apple iOS/iPadOS 17 must [selection: wipe protected data, wipe sensitive data] upon unenrollment from MDM.
Apple iOS/iPadOS 17 must [selection: remove Enterprise application, remove all noncore applications (any nonfactory-installed application)] upon unenrollment from MDM.
Apple iOS/iPadOS 17 must be configured to enforce an application installation policy by specifying one or more authorized application repositories, including [selection: DOD-approved commercial app repository, MDM server, mobile application store].
Apple iOS/iPadOS 17 must not include applications with the following characteristics: access to Siri when the device is locked.
Apple iOS/iPadOS 17 allow list must be configured to not include applications with the following characteristics: - backs up MD data to non-DOD cloud servers (including user and application access to cloud backup services);- transmits MD diagnostic data to non-DOD servers;- allows synchronization of data or applications between devices associated with user; and- allows unencrypted (or encrypted but not FIPS 140-2/FIPS 140-3 validated) data sharing with other MDs or printers.
Apple iPadOS 17 must be configured to disable multiuser modes.
Apple iOS/iPadOS 17 must be configured to [selection: wipe protected data, wipe sensitive data] upon unenrollment from MDM.
Apple iOS/iPadOS 17 must be configured to [selection: remove Enterprise applications, remove all noncore applications (any nonfactory-installed application)] upon unenrollment from MDM.
Apple iOS/iPadOS 17 must implement the management setting: limit Ad Tracking.
Apple iOS/iPadOS 17 must implement the management setting: not allow automatic completion of Safari browser passcodes.
Apple iOS/iPadOS 17 must implement the management setting: Encrypt backups/Encrypt local backup.
Apple iOS/iPadOS 17 must implement the management setting: not allow use of Handoff.
Apple iOS/iPadOS 17 must implement the management setting: not allow use of iPhone widgets on Mac.
Apple iOS/iPadOS 17 must implement the management setting: Disable Allow MailDrop.
Apple iOS/iPadOS 17 must implement the management setting: not allow messages in an ActiveSync Exchange account to be forwarded or moved to other accounts in the Apple iOS/iPadOS 17 Mail app.
Apple iOS/iPadOS 17 must implement the management setting: Treat AirDrop as an unmanaged destination.
Apple iOS/iPadOS 17 must implement the management setting: not have any Family Members in Family Sharing.
Apple iOS/iPadOS 17 users must complete required training.
Apple iOS/iPadOS 17 must implement the management setting: enable USB Restricted Mode.
Apple iOS/iPadOS 17 must not allow managed apps to write contacts to unmanaged contacts accounts.
Apple iOS/iPadOS 17 must not allow unmanaged apps to read contacts from managed contacts accounts.
Apple iOS/iPadOS 17 must implement the management setting: disable AirDrop.
Apple iOS/iPadOS 17 must implement the management setting: disable paired Apple Watch.
Apple iOS/iPadOS 17 must implement the management setting: approved Apple Watches must be managed by an MDM.
Apple iOS/iPadOS 17 must disable "Password AutoFill" in browsers and applications.
Apple iOS/iPadOS 17 must disable allow setting up new nearby devices.
Apple iOS/iPadOS 17 must disable password proximity requests.
Apple iOS/iPadOS 17 must disable password sharing.
Apple iOS/iPadOS 17 must disable "Find My Friends" in the "Find My" app.
The Apple iOS/iPadOS 17 must be supervised by the MDM.
Apple iOS must implement the management setting: not allow a user to remove Apple iOS configuration profiles that enforce DOD security requirements.
Apple iOS/iPadOS 17 must disable "Allow network drive access in Files access".
Apple iOS/iPadOS 17 must disable connections to Siri servers for the purpose of dictation.
Apple iOS/iPadOS 17 must disable connections to Siri servers for the purpose of translation.
Apple iOS/iPadOS 17 must disable copy/paste of data from managed to unmanaged applications.
Apple iOS/iPadOS 17 must have DOD root and intermediate PKI certificates installed.
Apple iOS/iPadOS 17 must not allow backup to remote systems (iCloud document and data synchronization).
Apple iOS/iPadOS 17 must not allow backup to remote systems (iCloud Keychain).
Apple iOS/iPadOS 17 must not allow backup to remote systems (Cloud Photo Library).
Apple iOS/iPadOS 16 must allow the Administrator (MDM) to perform the following management function: enable/disable VPN protection across the device and [selection: other methods].
Apple iOS/iPadOS 16 must not allow backup to remote systems (iCloud document and data synchronization).
Apple iOS/iPadOS 16 must not allow backup to remote systems (iCloud Keychain).
Apple iOS/iPadOS 16 must not allow backup to remote systems (My Photo Stream).
Apple iOS/iPadOS 16 must not allow backup to remote systems (iCloud Photo Sharing, also known as Shared Photo Streams).
Apple iOS/iPadOS 16 must [selection: wipe protected data, wipe sensitive data] upon unenrollment from MDM.
Apple iOS/iPadOS 16 must [selection: remove Enterprise application, remove all noncore applications (any nonfactory-installed application)] upon unenrollment from MDM.
Apple iOS/iPadOS 16 must be configured to enforce an application installation policy by specifying one or more authorized application repositories, including [selection: DoD-approved commercial app repository, MDM server, mobile application store].
Apple iOS/iPadOS 16 must not include applications with the following characteristics: access to Siri when the device is locked.
Apple iOS/iPadOS 16 allow list must be configured to not include applications with the following characteristics: allow voice dialing when MD is locked.
Apple iOS/iPadOS 16 allowlist must be configured to not include applications with the following characteristics: - Backs up MD data to non-DoD cloud servers (including user and application access to cloud backup services); - Transmits MD diagnostic data to non-DoD servers; - Allows synchronization of data or applications between devices associated with user; and - Allows unencrypted (or encrypted but not FIPS 140-2/FIPS 140-3 validated) data sharing with other MDs or printers.
Apple iOS/iPadOS 16 must be configured to disable multiuser modes.
Apple iOS/iPadOS 16 must be configured to [selection: wipe protected data, wipe sensitive data] upon unenrollment from MDM.
Apple iOS/iPadOS 16 must be configured to [selection: remove Enterprise applications, remove all noncore applications (any nonfactory installed application)] upon unenrollment from MDM.
Apple iOS/iPadOS 16 must implement the management setting: limit Ad Tracking.
Apple iOS/iPadOS 16 must implement the management setting: Not allow automatic completion of Safari browser passcodes.
Apple iOS/iPadOS 16 must implement the management setting: not allow use of Handoff.
Apple iOS/iPadOS 16 must implement the management setting: Disable Allow MailDrop.
Apple iOS/iPadOS 16 must implement the management setting: Not have any Family Members in Family Sharing.
Apple iOS/iPadOS 16 must implement the management setting: Enable USB Restricted Mode.
Apple iOS/iPadOS 16 must implement the management setting: Disable AirDrop.
Apple iOS/iPadOS 16 must implement the management setting: Disable paired Apple Watch.
Apple iOS/iPadOS 16 must disable Password AutoFill in browsers and applications.
Apple iOS/iPadOS 16 must disable allow setting up new nearby devices.
Apple iOS/iPadOS 16 must disable password proximity requests.
Apple iOS/iPadOS 16 must disable password sharing.
Apple iOS/iPadOS 16 must disable Find My Friends in the Find My app.
The Apple iOS/iPadOS 16 must be supervised by the MDM.
Apple iOS/iPadOS 16 must disable "Allow USB drive access in Files app" if the authorizing official (AO) has not approved the use of DoD-approved USB storage drives with iOS/iPadOS devices.
Apple iOS must implement the management setting: Not allow a user to remove Apple iOS configuration profiles that enforce DoD security requirements.
Apple iOS/iPadOS 16 must disable "Allow network drive access in Files access".
Apple iOS/iPadOS 16 must disable connections to Siri servers for the purpose of dictation.
Apple iOS/iPadOS 16 must disable connections to Siri servers for the purpose of translation.
The macOS system must be integrated into a directory services infrastructure.
Apple iOS/iPadOS 17 must not allow backup to remote systems (iCloud Photo Sharing, also known as Shared Stream or Shared Photo Stream).
Apple iOS/iPadOS 17 must not allow backup to remote systems (managed applications data stored in iCloud).
Apple iOS/iPadOS 17 must not allow backup to remote systems (enterprise books).
Apple iOS/iPadOS 17 must disable "Allow USB drive access in Files app" if the authorizing official (AO) has not approved the use of DOD-approved USB storage drives with iOS/iPadOS devices.
The macOS system must be configured with dedicated user accounts to decrypt the hard disk upon startup.
The macOS system must be configured to disable password forwarding for FileVault.
The macOS system must disable the Screen Sharing feature.
The macOS system must allow only applications that have a valid digital signature to run.
The macOS system must not allow an unattended or automatic logon to the system.
The macOS system must set permissions on user home directories to prevent users from having access to read or modify another user's files.
The macOS system must use an approved antivirus program.
The macOS system must be configured to prevent displaying password hints.
The macOS system must be configured with a firmware password to prevent access to single user mode and booting from alternative media.
The macOS system must be configured so that the login command requires smart card authentication.
The macOS system must be configured so that the su command requires smart card authentication.
The macOS system must be configured so that the sudo command requires smart card authentication.
The macOS system must be configured with the sudoers file configured to authenticate users on a per -tty basis.
The macOS Application Firewall must be enabled.
The macOS system must restrict the ability to utilize external writeable media devices.
The macOS system logon window must be configured to prompt for username and password, rather than show a list of users.
The macOS system must restrict the ability of individuals to write to external optical media.
The macOS system must be integrated into a directory services infrastructure.
The macOS system must only allow applications with a valid digital signature to run.
The macOS system must restrict the ability of individuals to use USB storage devices.
The macOS system logon window must be configured to prompt for username and password.
CylancePROTECT Mobile malware detection must be configured with the following compliance actions for system apps (Android only):
-Prompt for compliance: Immediate enforcement action.
-Prevent the user from accessing work resources and apps on the device while it is out of compliance.
-Prevent the user from accessing BlackBerry Dynamics apps while the device is out of compliance.
CylancePROTECT Mobile malware detection must be configured with the following compliance actions for nonsystem apps (Android only):
-Prompt for compliance: Immediate enforcement action.
-Prevent the user from accessing work resources and apps on the device while it is out of compliance.
-Prevent the user from accessing BlackBerry Dynamics apps while the device is out of compliance.
CylancePROTECT Mobile must be configured with the following compliance action when a compliance event occurs:
-Notify Administrator (send event notification).
CylancePROTECT Mobile must be configured with the following compliance actions when sideloaded apps are detected:
-Prompt for compliance: Immediate enforcement action.
-Prevent the user from accessing work resources and apps on the device while it is out of compliance.
-Prevent the user from accessing BlackBerry Dynamics apps while the device is out of compliance.
CylancePROTECT Mobile must be configured with the following safe browsing controls for BlackBerry Dynamics apps:
-Block all unsafe URLs
-Select one of the following for "scanning option": "Cloud scanning" or "On device scanning".
-Disable "Allow users to override blocked resources and enable access to the requested domain".
CylancePROTECT Mobile must be configured with the following compliance actions when insecure networks are detected for mobile devices:
-Block device from network connection and insecure Wi-Fi access points.
-Block access to BlackBerry Dynamics apps.
CylancePROTECT Mobile must be configured with the following compliance actions for integrity violations with BlackBerry Dynamics apps on iOS devices:
-Prompt for compliance: Immediate enforcement action
-Prevent the user from accessing BlackBerry Dynamics apps while the device is out of compliance.
CylancePROTECT Mobile must be configured with the following Android security patch compliance and hardware certificate attestation controls:
-"Android hardware attestation frequency" = 6 hours
-"Device grace period" = 0 hours
-"Challenge frequency for noncompliant devices" = 6 hours.
CylancePROTECT Mobile must be configured with the following compliance actions when an Android device fails security patch compliance and attestation:
-Prompt behavior: Immediate enforcement action.
-Enforcement action for device: Select either "Untrust", "Delete only work data" or "Delete all data".
-Enforcement action for BlackBerry Dynamics apps: Select either "Do not allow BlackBerry Dynamics apps to run" or "Delete BlackBerry Dynamics apps data".
CylancePROTECT Mobile must be configured with the following compliance actions when a hardware attestation failure occurs (Android only):
-Prompt for compliance: Immediate enforcement action.
-Enforcement action for BlackBerry Dynamics apps: Do not allow BlackBerry Dynamics apps to run.
CylancePROTECT Mobile must be configured with the following compliance actions when a hardware attestation certificate failure occurs (Android only):
-Minimum security level required: "Trusted Environment" or "StrongBox"
-Prompt behavior: "Immediate enforcement action".
-Enforcement action for BlackBerry Dynamics apps: "Do not allow BlackBerry Dynamics apps to run".
CylancePROTECT Mobile must be configured with the following compliance actions when a hardware attestation boot state failure occurs (Android only):
-Prompt behavior: "Immediate enforcement action".
-Enforcement action for BlackBerry Dynamics apps: "Do not allow BlackBerry Dynamics apps to run".
CylancePROTECT Mobile must be configured to disable anonymous data collection by BlackBerry for both iOS and Android devices.
CylancePROTECT Mobile must be configured to enable SMS text message scanning (iOS only).
The Ubuntu operating system must enforce a delay of at least 4 seconds between logon prompts following a failed logon attempt.
The macOS system must disable unattended or automatic log on to the system.
The macOS system must secure user's home folders.
The macOS system must enable firmware password.
The macOS system must enable the application firewall.
The macOS system must enforce enrollment in mobile device management.
The macOS system must enable recovery lock.
The macOS system must enforce installation of XProtect Remediator and Gatekeeper updates automatically.
The Ubuntu operating system must prevent the use of dictionary words for passwords.
The Ubuntu Operating system must be configured so that when passwords are changed or new passwords are established, pwquality must be used.
The Ubuntu Operating system must disable the x86 Ctrl-Alt-Delete key sequence if a graphical user interface is installed.
The Ubuntu Operating system must disable the x86 Ctrl-Alt-Delete key sequence.
The Ubuntu operating system must not allow unattended or automatic login via ssh.
The Ubuntu operating system default filesystem permissions must be defined in such a way that all authenticated users can only read and modify their own files.
The Ubuntu operating system must enable and run the uncomplicated firewall(ufw).
The Ubuntu operating system must be configured so that remote X connections are disabled, unless to fulfill documented and validated mission requirements.
The Ubuntu operating system SSH daemon must prevent remote hosts from connecting to the proxy display.
All local interactive user home directories defined in the /etc/passwd file must exist.
All local interactive user home directories must have mode 0750 or less permissive.
All local interactive user home directories must be group-owned by the home directory owners primary group.
The Ubuntu operating system must not have accounts configured with blank or null passwords.
The Ubuntu operating system must not allow accounts configured with blank or null passwords.
The Ubuntu operating system default filesystem permissions must be defined in such a way that all authenticated users can read and modify only their own files.
The Ubuntu operating system must not allow unattended or automatic login via SSH.
The Ubuntu operating system must be configured so that remote X connections are disabled, unless to fulfill documented and validated mission requirements.
The Ubuntu operating system must be configured so that when passwords are changed or new passwords are established, pwquality must be used.
The Ubuntu operating system must have an application firewall enabled.
The Ubuntu operating system must disable the x86 Ctrl-Alt-Delete key sequence if a graphical user interface is installed.
The Ubuntu operating system must disable the x86 Ctrl-Alt-Delete key sequence.
The Cisco ASA must be configured to use TCP when sending log records to the central audit server.
The Cisco ASA must be configured to inspect all inbound and outbound traffic at the application layer.
The Cisco ASA must be configured to inspect all inbound and outbound IPv6 traffic for unknown or out-of-order extension headers.
The Cisco ASA must be configured to restrict it from accepting outbound packets that contain an illegitimate address in the source address field via an egress filter or by enabling Unicast Reverse Path Forwarding (uRPF).
The Cisco ASA must be configured to not accept certificates that have been revoked when using PKI for authentication.
The Cisco ASA must be configured to use Internet Key Exchange (IKE) for all IPsec security associations.
The Cisco BGP router must be configured to use its loopback address as the source address for iBGP peering sessions.
The Cisco MPLS router must be configured to use its loopback address as the source address for LDP peering sessions.
The Cisco MPLS router must be configured to synchronize IGP and LDP to minimize packet loss when an IGP adjacency is established prior to LDP peers completing label exchange.
The Cisco MPLS router must be configured to have TTL Propagation disabled.
The Cisco PE router must be configured to have each Virtual Routing and Forwarding (VRF) instance bound to the appropriate physical or logical interfaces to maintain traffic separation between all MPLS L3VPNs.
The Cisco PE router must be configured to have each Virtual Routing and Forwarding (VRF) instance with the appropriate Route Target (RT).
The Cisco PE router must be configured to have each VRF with the appropriate Route Distinguisher (RD).
The Cisco PE router providing MPLS Virtual Private Wire Service (VPWS) must be configured to have the appropriate virtual circuit identification (VC ID) for each attachment circuit.
The Cisco router must be configured to back up the configuration when changes occur.
The Cisco router must be configured to obtain its public key certificates from an appropriate certificate policy through an approved service provider.
The Cisco router must be running an IOS release that is currently supported by Cisco Systems.
The Cisco Multicast Source Discovery Protocol (MSDP) router must be configured to use a loopback address as the source address when originating MSDP traffic.
The Cisco router must be configured to have Cisco Express Forwarding enabled.
The Cisco router must be configured to advertise a hop limit of at least 32 in Router Advertisement messages for IPv6 stateless auto-configuration deployments.
The Cisco router must not be configured to use IPv6 Site Local Unicast addresses.
The Cisco perimeter router must be configured to suppress Router Advertisements on all external IPv6-enabled interfaces.
The Cisco switch must have Storm Control configured on all host-facing switchports.
The Cisco switch must have IGMP or MLD Snooping configured on all VLANs.
The Cisco switch must implement Rapid Spanning Tree Protocol (STP) where VLANs span multiple switches with redundant links.
The Cisco switch must enable Unidirectional Link Detection (UDLD) to protect against one-way connections.
The Cisco switch must have all trunk links enabled statically.
The Cisco switch must have all disabled switch ports assigned to an unused VLAN.
The Cisco switch must not have the default VLAN assigned to any host-facing switch ports.
The Cisco switch must have the default VLAN pruned from all trunk ports that do not require it.
The Cisco switch must not use the default VLAN for management traffic.
The Cisco switch must have all user-facing or untrusted ports configured as access switch ports.
The Cisco switch must have the native VLAN assigned to an ID other than the default VLAN for all 802.1q trunk links.
The Cisco switch must not have any switchports assigned to the native VLAN.
The Cisco switch must be configured to have Cisco Express Forwarding enabled.
The Cisco switch must be configured to advertise a hop limit of at least 32 in Switch Advertisement messages for IPv6 stateless auto-configuration deployments.
The Cisco switch must not be configured to use IPv6 Site Local Unicast addresses.
The Cisco perimeter switch must be configured to suppress Router Advertisements on all external IPv6-enabled interfaces.
The Cisco switch must implement Rapid STP where VLANs span multiple switches with redundant links.
The Cisco switch must be configured to support organizational requirements to conduct backups of the configuration when changes occur.
The Cisco switch must be configured to obtain its public key certificates from an appropriate certificate policy through an approved service provider.
The Cisco switch must be running an IOS release that is currently supported by Cisco Systems.
The Cisco MPLS router must be configured to synchronize Interior Gateway Protocol (IGP) and LDP to minimize packet loss when an IGP adjacency is established prior to LDP peers completing label exchange.
The Cisco router must be configured to synchronize its clock with the primary and secondary time sources using redundant authoritative time sources.
The Cisco ISE must be configured to synchronize internal information system clocks using redundant authoritative time sources.
The Cisco ISE must enforce access restrictions associated with changes to the firmware, OS, and hardware components.
The Cisco ISE must be configured to use an external authentication server to authenticate administrators prior to granting administrative access.
The Cisco ISE must be running an operating system release that is currently supported by the vendor.
The Cisco ISE must generate log records for a locally developed list of auditable events.
The Cisco ISE must be configured to conduct backups of system level information contained in the information system when changes occur.
The Cisco ISE must conduct backups of information system documentation, including security-related configuration files when changes occur or weekly, whichever is sooner.
The Cisco ISE must use DoD-approved PKI rather than proprietary or self-signed device certificates.
The Cisco PE router providing Virtual Private LAN Services (VPLS) must be configured to have all attachment circuits defined to the virtual forwarding instance (VFI) with the globally unique VPN ID assigned for each customer VLAN.
The Cisco PE router must be configured to enforce the split-horizon rule for all pseudowires within a Virtual Private LAN Services (VPLS) bridge domain.
The Cisco BGP switch must be configured to use a unique key for each autonomous system (AS) that it peers with.
The Cisco BGP switch must be configured to use its loopback address as the source address for iBGP peering sessions.
The Cisco MPLS switch must be configured to use its loopback address as the source address for LDP peering sessions.
The Cisco MPLS switch must be configured to synchronize Interior Gateway Protocol (IGP) and LDP to minimize packet loss when an IGP adjacency is established prior to LDP peers completing label exchange.
The Cisco MPLS switch must be configured to have TTL Propagation disabled.
The Cisco PE switch must be configured to have each Virtual Routing and Forwarding (VRF) instance bound to the appropriate physical or logical interfaces to maintain traffic separation between all MPLS L3VPNs.
The Cisco PE switch must be configured to have each Virtual Routing and Forwarding (VRF) instance with the appropriate Route Target (RT).
The Cisco PE switch must be configured to have each VRF with the appropriate Route Distinguisher (RD).
The Cisco PE switch providing MPLS Virtual Private Wire Service (VPWS) must be configured to have the appropriate virtual circuit identification (VC ID) for each attachment circuit.
The Cisco PE switch providing Virtual Private LAN Services (VPLS) must be configured to have all attachment circuits defined to the virtual forwarding instance (VFI) with the globally unique VPN ID assigned for each customer VLAN.
The Cisco PE switch must be configured to enforce the split-horizon rule for all pseudowires within a Virtual Private LAN Services (VPLS) bridge domain.
The Cisco Multicast Source Discovery Protocol (MSDP) switch must be configured to use a loopback address as the source address when originating MSDP traffic.
The Cisco PE router providing MPLS Virtual Private Wire Service (VPWS) must be configured to have the appropriate pseudowire ID for each attachment circuit.
The Cisco BGP router must be configured to use a unique key for each autonomous system (AS) that it peers with.
The Cisco ISE must perform continuous detection and tracking of endpoint devices attached to the network. This is required for compliance with C2C Step 1.
The Cisco ISE must enforce posture status assessment for posture required clients defined in the NAC System Security Plan (SSP). This is required for compliance with C2C Step 3.
The Cisco ISE must have a posture policy for posture required clients defined in the NAC System Security Plan (SSP). This is required for compliance with C2C Step 2.
The Cisco switch must be configured to synchronize its clock with the primary and secondary time sources using redundant authoritative time sources.
The Cisco switch must be configured to implement message authentication for all control plane protocols.
The Cisco switch must be configured to use keys with a duration not exceeding 180 days for authenticating routing protocol messages.
The Cisco multicast Designated switch (DR) must be configured to set the shortest-path tree (SPT) threshold to infinity to minimalize source-group (S, G) state within the multicast topology where Any Source Multicast (ASM) is deployed.
The container platform must provide the configuration for organization-identified individuals or roles to change the auditing to be performed on all components, based on all selectable event criteria within organization-defined time thresholds.
Container platform components must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including SRGs, STIGs, NSA configuration guides, CTOs, and DTMs.
The container platform must be able to store and instantiate industry standard container images.
The container platform must continuously scan components, containers, and images for vulnerabilities.
The DBMS must be configured in accordance with the security configuration settings based on DoD security configuration and implementation guidance, including STIGs, NSA configuration guides, CTOs, DTMs, and IAVMs.
Google Android 13 must be configured to enforce an application installation policy by specifying one or more authorized application repositories.
Google Android 13 allowlist must be configured to not include applications with the following characteristics (work profile only):
1. Back up mobile device (MD) data to non-DOD cloud servers (including user and application access to cloud backup services);
2. Transmit MD diagnostic data to non-DOD servers;
3. Voice assistant application if available when MD is locked;
4. Voice dialing application if available when MD is locked;
5. Allows synchronization of data or applications between devices associated with user; and
6. Allows unencrypted (or encrypted but not FIPS 140-2 validated) data sharing with other MDs or printers.
Google Android 13 must have the DOD root and intermediate PKI certificates installed (work profile only).
The Google Android 13 work profile must be configured to enforce the system application disable list (work profile only).
Google Android 13 must be provisioned as a BYOAD device (Android work profile for employee-owned devices [BYOD]).
The Google Android 13 work profile must be configured to disable automatic completion of workspace internet browser text input.
The EMM system supporting the Google Android 13 BYOAD must be configured for autonomous monitoring, compliance, and validation to ensure security/configuration settings of mobile devices do not deviate from the approved configuration baseline.
The EMM system supporting the Google Android 13 BYOAD must be configured to initiate autonomous monitoring, compliance, and validation prior to granting the Google Android 13 BYOAD access to DOD information and IT resources.
The EMM system supporting the Google Android 13 BYOAD must be configured to detect if the Google Android 13 BYOAD native security controls are disabled.
The EMM system supporting the Google Android 13 BYOAD must be configured to detect if known malicious applications, blocked, or prohibited applications are installed on the Google Android 13 BYOAD (DOD-managed segment only).
The EMM detection/monitoring system must use continuous monitoring of enrolled Google Android 13 BYOAD.
The Google Android 13 BYOAD must be configured to either disable access to DOD data and IT systems and user accounts or wipe the work profile if the EMM system detects native security controls are disabled.
The Google Android 13 BYOAD must be configured to either disable access to DOD data and IT systems and user accounts or wipe the work profile if the EMM system detects the Google Android 13 BYOAD device has known malicious, blocked, or prohibited applications, or configured to access nonapproved third-party applications stores in the work profile.
The Google Android 13 BYOAD must be configured so that the work profile is removed if the device is no longer receiving security or software updates.
The EMM system supporting the Google Android 13 BYOAD must be NIAP validated (included on the NIAP list of compliant products or products in evaluation) unless the DOD CIO has granted an Approved Exception to Policy (E2P).
Network prediction must be disabled.
The HPE Nimble must be configured to use an authentication server for the purpose of authenticating users prior to granting administrative access.
The HPE Nimble must obtain its public key certificates from an appropriate certificate policy through an approved service provider.
The HPE Nimble must be running an operating system release that is currently supported by the vendor.
The HPE Nimble must be configured to synchronize internal information system clocks using an authoritative time source.
Android 13 devices must be configured to disable the use of third-party keyboards (work profile only).
The Google Android 13 must allow only the administrator (EMM) to install/remove DOD root and intermediate PKI certificates (work profile).
Google Android 14 must be configured to enforce an application installation policy by specifying one or more authorized application repositories, including [selection: DOD-approved commercial app repository, MDM server, mobile application store].
Google Android 14 allowlist must be configured to not include applications with the following characteristics:
- Back up mobile device (MD) data to non-DOD cloud servers (including user and application access to cloud backup services);
- Transmit MD diagnostic data to non-DOD servers;
- Voice assistant application if available when MD is locked;
- Voice dialing application if available when MD is locked;
- Allows synchronization of data or applications between devices associated with user; and
- Allows unencrypted (or encrypted but not FIPS 140-2/140-3 validated) data sharing with other MDs or printers.
Google Android 14 must be configured to disable multiuser modes.
Google Android 14 users must complete required training.
Google Android 14 must be configured to enforce that Wi-Fi Sharing is disabled.
Google Android 14 must have the DOD root and intermediate PKI certificates installed.
The Google Android 14 work profile must be configured to enforce the system application disable list.
Google Android 14 must be configured to disallow configuration of date and time.
Android 14 devices must have the latest available Google Android 14 operating system installed.
Android 14 devices must be configured to disable the use of third-party keyboards.
Android 14 devices must be configured to enable Common Criteria Mode (CC Mode).
The Google Android 14 must allow only the administrator (EMM) to install/remove DOD root and intermediate PKI certificates.
The Google Android 14 work profile must be configured to prevent users from adding personal email accounts to the work email app.
Google Android 14 must be provisioned as a fully managed device and configured to create a work profile.
The Google Android 14 work profile must be configured to disable automatic completion of workspace internet browser text input.
The Google Android 14 work profile must be configured to disable the autofill services.
The operating system must enforce dual authorization for movement and/or deletion of all audit information, when such movement or deletion is not part of an authorized automatic process.
The operating system must prevent the use of dictionary words for passwords.
The operating system must enforce a delay of at least 4 seconds between logon prompts following a failed logon attempt.
The operating system must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.
The operating system must define default permissions for all authenticated users in such a way that the user can only read and modify their own files.
The operating system must not allow an unattended or automatic logon to the system.
The operating system must limit the ability of non-privileged users to grant other users direct access to the contents of their home directories/folders.
The operating system must enable an application firewall, if available.
SSMC must enforce a delay of at least four seconds between logon prompts following a failed logon attempt.
The HPE 3PAR OS must be configured to restrict the encryption algorithms and protocols to comply with DOD-approved encryption to protect the confidentiality and integrity of remote access sessions.
AIX system must prevent the root account from directly logging in except from the system console.
All AIX public directories must be owned by root or an application account.
AIX administrative accounts must not run a web browser, except as needed for local service administration.
AIX default system accounts (with the exception of root) must not be listed in the cron.allow file or must be included in the cron.deny file, if cron.allow does not exist.
The AIX root account must not have world-writable directories in its executable search path.
The Group Identifiers (GIDs) reserved for AIX system accounts must not be assigned to non-system accounts as their primary group GID.
UIDs reserved for system accounts must not be assigned to non-system accounts on AIX systems.
The AIX root accounts list of preloaded libraries must be empty.
AIX must not have accounts configured with blank or null passwords.
The AIX root accounts home directory (other than /) must have mode 0700.
The AIX root accounts home directory must not have an extended ACL.
The AIX /etc/passwd, /etc/security/passwd, and/or /etc/group files must not contain a plus (+) without defining entries for NIS+ netgroups or LDAP netgroups.
All AIX NFS anonymous UIDs and GIDs must be configured to values without permissions.
AIX nosuid option must be enabled on all NFS client mounts.
AIX must prevent the use of dictionary words for passwords.
The password hashes stored on AIX system must have been generated using a FIPS 140-2 approved cryptographic hashing algorithm.
If SNMP service is enabled on AIX, the default SNMP password must not be used in the /etc/snmpd.conf config file.
AIX must require passwords to contain no more than three consecutive repeating characters.
AIX removable media, remote file systems, and any file system not containing approved device files must be mounted with the nodev option.
AIX audit logs must be rotated daily.
AIX must be configured with a default gateway for IPv4 if the system uses IPv4, unless the system is a router.
IP forwarding for IPv4 must not be enabled on AIX unless the system is a router.
AIX must be configured with a default gateway for IPv6 if the system uses IPv6 unless the system is a router.
AIX must not have IP forwarding for IPv6 enabled unless the system is an IPv6 router.
The inetd.conf file on AIX must be owned by root.
AIX cron and crontab directories must be owned by root or bin.
AIX audio devices must be group-owned by root, sys, bin, or system.
AIX time synchronization configuration file must be owned by root.
AIX time synchronization configuration file must be group-owned by bin, or system.
The AIX /etc/group file must be owned by root.
The AIX /etc/group file must be group-owned by security.
All AIX interactive users home directories must be owned by their respective users.
All AIX interactive users home directories must be group-owned by the home directory owner primary group.
All files and directories contained in users home directories on AIX must be group-owned by a group in which the home directory owner is a member.
Samba packages must be removed from AIX.
AIX time synchronization configuration file must have mode 0640 or less permissive.
The AIX /etc/group file must have mode 0644 or less permissive.
AIX must encrypt user data at rest using AIX Encrypted File System (EFS) if it is required.
On AIX, the SSH server must not permit root logins using remote access programs.
All AIX shells referenced in passwd file must be listed in /etc/shells file, except any shells specified for the purpose of preventing logins.
AIX SSH daemon must be configured to only use Message Authentication Codes (MACs) employing FIPS 140-2 approved cryptographic hash algorithms.
The AIX SSH daemon must be configured for IP filtering.
The AIX SSH daemon must not allow compression.
AIX must turn on SSH daemon privilege separation.
AIX must turn on SSH daemon reverse name checking.
AIX SSH daemon must perform strict mode checking of home directory configuration files.
AIX must turn off X11 forwarding for the SSH daemon.
AIX must turn off TCP forwarding for the SSH daemon.
The AIX SSH daemon must be configured to disable empty passwords.
The AIX SSH daemon must be configured to disable user .rhosts files.
The AIX SSH daemon must be configured to not use host-based authentication.
The AIX SSH daemon must not allow RhostsRSAAuthentication.
If AIX SSH daemon is required, the SSH daemon must only listen on the approved listening IP addresses.
AIX system must require authentication upon booting into single-user and maintenance modes.
AIX must implement a remote syslog server that is documented using site-defined procedures.
The AIX syslog daemon must not accept remote messages unless it is a syslog server documented using site-defined procedures.
AIX passwd.nntp file must have mode 0600 or less permissive.
The AIX /etc/group file must not have an extended ACL.
The AIX ldd command must be disabled.
AIX NFS server must be configured to restrict file system access to local hosts.
All AIX users home directories must have mode 0750 or less permissive.
The AIX user home directories must not have extended ACLs.
AIX must enforce a delay of at least 4 seconds between login prompts following a failed login attempt.
AIX system must restrict the ability to switch to the root user to members of a defined group.
All AIX Group Identifiers (GIDs) referenced in the /etc/passwd file must be defined in the /etc/group file.
All AIX files and directories must have a valid owner.
The sticky bit must be set on all public directories on AIX systems.
The AIX global initialization files must contain the mesg -n or mesg n commands.
The AIX hosts.lpd file must not contain a + character.
AIX sendmail logging must not be set to less than nine in the sendmail.cf file.
AIX run control scripts executable search paths must contain only absolute paths.
The AIX DHCP client must be disabled.
AIX process core dumps must be disabled.
AIX kernel core dumps must be disabled unless needed.
AIX must set Stack Execution Disable (SED) system wide mode to all.
The /etc/shells file must exist on AIX systems.
AIX public directories must be the only world-writable directories and world-writable files must be located only in public directories.
AIX must be configured to only boot from the system boot device.
AIX must not use removable media as the boot loader.
If the AIX host is running an SMTP service, the SMTP greeting must not provide version information.
AIX must contain no .forward files.
The sendmail server must have the debug feature disabled on AIX systems.
SMTP service must not have the EXPN or VRFY features active on AIX systems.
All global initialization file executable search paths must contain only absolute paths.
The SMTP service HELP command must not be enabled on AIX.
NIS maps must be protected through hard-to-guess domain names on AIX.
The AIX systems access control program must be configured to grant or deny system access to specific hosts.
All AIX files and directories must have a valid group owner.
AIX control scripts library search paths must contain only absolute paths.
The control script lists of preloaded libraries must contain only absolute paths on AIX systems.
The global initialization file lists of preloaded libraries must contain only absolute paths on AIX.
The local initialization file library search paths must contain only absolute paths on AIX.
The local initialization file lists of preloaded libraries must contain only absolute paths on AIX.
AIX package management tool must be used daily to verify system software.
The AIX DHCP client must not send dynamic DNS updates.
AIX must not run any routing protocol daemons unless the system is a router.
AIX must not process ICMP timestamp requests.
AIX must not respond to ICMPv6 echo requests sent to a broadcast address.
AIX must define default permissions for all authenticated users in such a way that the user can only read and modify their own files.
There must be no .rhosts, .shosts, hosts.equiv, or shosts.equiv files on the AIX system.
The .rhosts file must not be supported in AIX PAM.
The AIX root user home directory must not be the root directory (/).
The EXITS GSO record value must specify the module names of site written ACF2 exit routines.
The CA-ACF2 LOGONID with the REFRESH attribute must have procedures for utilization.
IBM z/OS TSO GSO record values must be set to the values specified.
IBM z/OS procedures must restrict ACF2 LOGONIDs with the READALL attribute to auditors and/or authorized users.
IBM z/OS must have the RULEVLD and RSRCVLD attributes specified for LOGONIDs with the SECURITY attribute.
IBM z/OS LOGONIDs with the AUDIT or CONSULT attribute must be properly scoped.
IBM z/OS LOGONID with the ACCTPRIV attribute must be restricted to the ISSO.
IBM z/OS batch jobs with restricted ACF2 LOGONIDs must have the PGM(xxxxxxxx) and SUBAUTH attributes or the SOURCE(xxxxxxxx) attribute assigned to the corresponding LOGONIDs.
CA-ACF2 RULEOPTS GSO record values must be set to the values specified.
The CA-ACF2 GSO OPTS record value must be properly specified.
CA-ACF2 must prevent the use of dictionary words for passwords.
CA-ACF2 database must be on a separate physical volume from its backup and recovery data sets.
CA-ACF2 database must be backed up on a scheduled basis.
ACF2 REFRESH attribute must be restricted to security administrators' LOGON ID only.
ACF2 maintenance LOGONIDs must have corresponding GSO MAINT records.
ACF2 LOGONIDs with the NON-CNCL attribute specified in the associated LOGONID record must be listed as trusted and must be specifically approved.
ACF2 LOGONIDs with the ACCOUNT, LEADER, or SECURITY attribute must be properly scoped.
ACF2 LOGONIDs associated with started tasks that have the MUSASS attribute and the requirement to submit jobs on behalf of its users must have the JOBFROM attribute as required.
ACF2 emergency LOGONIDS with the REFRESH attribute must have the SUSPEND attribute specified.
ACF2 BACKUP GSO record must be defined with a TIME value specifies greater than 00 unless the database is shared and backed up on another system.
ACF2 APPLDEF GSO record if used must have supporting documentation indicating the reason it was used.
All AIX interactive users must be assigned a home directory in the passwd file and the directory must exist.
The AIX operating system must be configured to authenticate using Multi Factor Authentication.
The AIX operating system must be configured to use Multi Factor Authentication for remote connections.
AIX must have the have the PowerSC Multi Factor Authentication Product configured.
The AIX operating system must be configured to use a valid server_ca.pem file.
AIX must employ a deny-all, allow-by-exception firewall policy for allowing connections to other systems.
The AIX /etc/hosts file must be owned by root.
The AIX /etc/hosts file must be group-owned by system.
The AIX /etc/hosts file must have a mode of 0640 or less permissive.
AIX cron and crontab directories must have a mode of 0640 or less permissive.
The AIX /etc/syslog.conf file must be owned by root.
The AIX /etc/syslog.conf file must be group-owned by system.
The AIX /etc/syslog.conf file must have a mode of 0640 or less permissive.
The inetd.conf file on AIX must be group owned by the "system" group.
The AIX /etc/inetd.conf file must have a mode of 0640 or less permissive.
The AIX /var/spool/cron/atjobs directory must be owned by root or bin.
The AIX /var/spool/cron/atjobs directory must be group-owned by cron.
The AIX /var/spool/cron/atjobs directory must have a mode of 0640 or less permissive.
The AIX cron and crontab directories must be group-owned by cron.
The CA-TSS NEWPW control options must be properly set.
IBM z/OS FTP Control cards must be properly stored in a secure PDS file.
IBM z/OS PASSWORD data set and OS passwords must not be used.
IBM z/OS must configure system waittimes to protect resource availability based on site priorities.
IBM z/OS Emergency LOGONIDs must be properly defined.
IBM z/OS DFSMS control data sets must reside on separate storage volumes.
IBM z/OS Policy Agent must employ a deny-all, allow-by-exception firewall policy for allowing connections to other systems.
IBM z/OS using DFSMS must properly specify SYS(x).PARMLIB(IGDSMSxx), SMS parameter settings.
IBM z/OS Configuration files for the TCP/IP stack must be properly specified.
IBM z/OS VTAM session setup controls for the TN3270 Telnet Server must be properly specified.
IBM z/OS UNIX OMVS parameters in PARMLIB must be properly specified.
IBM z/OS UNIX HFS MapName files security parameters must be properly specified.
IBM z/OS UNIX BPXPRMxx security parameters in PARMLIB must be properly specified.
IBM z/OS TCPIP.DATA configuration statement must contain the DOMAINORIGIN or DOMAIN specified for each TCP/IP defined.
IBM z/OS FTP.DATA configuration statements for the FTP Server must be specified in accordance with requirements.
IBM Integrated Crypto Service Facility (ICSF) Configuration parameters must be correctly specified.
IBM RACF must define WARN = NO on all profiles.
The IBM RACF PROTECTALL SETROPTS value specified must be properly set.
The IBM RACF GRPLIST SETROPTS value must be set to ACTIVE.
The IBM RACF RETPD SETROPTS value specified must be properly set.
IBM z/OS Started tasks must be properly defined to CA-TSS.
The CA-TSS CANCEL Control Option must not be specified.
The CA-TSS HPBPW Control Option must be set to three days maximum.
The CA-TSS INSTDATA Control Option must be set to 0.
The CA-TSS OPTIONS Control Option must include option 4 at a minimum.
CA-TSS TEMPDS Control Option must be set to YES.
The number of CA-TSS control ACIDs must be justified and properly assigned.
The number of CA-TSS ACIDs with MISC9 authority must be justified.
The CA-TSS LUUPDONCE Control Option value specified must be set to NO.
The CA-TSS Automatic Data Set Protection (ADSP) Control Option must be set to NO.
CA-TSS RECOVER Control Option must be set to ON.
The IBM RACF TAPEDSN SETROPTS value specified must be properly set.
The IBM RACF WHEN(PROGRAM) SETROPTS value specified must be active.
IBM RACF use of the AUDITOR privilege must be justified.
The IBM RACF database must be on a separate physical volume from its backup and recovery datasets.
The IBM RACF database must be backed up on a scheduled basis.
IBM z/OS Batch job user IDs must be properly defined.
IBM RACF use of the RACF SPECIAL Attribute must be justified.
IBM RACF assignment of the RACF OPERATIONS attribute to individual userids must be fully justified.
IBM RACF exit ICHPWX01 must be installed and properly configured.
IBM z/OS RJE workstations and NJE nodes must be controlled in accordance with security requirements.
The IBM z/OS Policy Agent must employ a deny-all, allow-by-exception firewall policy for allowing connections to other systems.
The CA-TSS database must be on a separate physical volume from its backup and recovery data sets.
The CA-TSS database must be backed up on a scheduled basis.
The IBM z/OS Policy Agent must be configured to deny-all, allow-by-exception firewall policy for allowing connections to other systems.
IBM z/OS must configure system wait times to protect resource availability based on site priorities.
IBM z/OS DFSMS control data sets must be properly protected.
IBM z/OS VTAM session setup controls for the TN3270 Telnet server must be properly specified.
IBM z/OS UNIX HFS MapName file security parameters must be properly specified.
IBM z/OS default profiles must be defined in the corresponding FACILITY Class Profile for classified systems.
IBM z/OS UNIX Telnet server Startup parameters must be properly specified.
The IBM z/OS TCPIP.DATA configuration statement must contain the DOMAINORIGIN or DOMAIN specified for each TCP/IP defined.
IBM z/OS Default profiles must not be defined in TSS OMVS UNIX security parameters for classified systems.
The IBM z/OS UNIX Telnet server Startup parameters must be properly specified.
The ICS, when utilizing PKI-based authentication, must be configured to validate certificates by constructing a certification path (which includes status information) to an accepted trust anchor.
The Juniper EX switch must be configured to enable Storm Control on all host-facing access interfaces.
The Juniper EX switch must be configured to enable IGMP or MLD Snooping on all VLANs.
If STP is used, the Juniper EX switch must be configured to implement Rapid STP, or Multiple STP, where VLANs span multiple switches with redundant links.
The Juniper EX switch must be configured to verify two-way connectivity on all interswitch trunked interfaces.
The Juniper EX switch must be configured to assign all disabled access interfaces to an unused VLAN.
The Juniper EX switch must not be configured with VLANs used for L2 control traffic assigned to any host-facing access interface.
The Juniper EX switch must be configured to prune the default VLAN from all trunked interfaces that do not require it.
The Juniper EX switch must not use the default VLAN for management traffic.
The Juniper EX switch must be configured to set all user-facing or untrusted ports as access interfaces.
The Juniper EX switch must not have a native VLAN ID assigned, or have a unique native VLAN ID, for all 802.1q trunk links.
The Juniper EX switch must not have any access interfaces assigned to a VLAN configured as native for any trunked interface.
The ICS must be configured to prevent nonprivileged users from executing privileged functions.
The ICS must be configured to synchronize internal information system clocks using redundant authoritative time sources.
The ICS must be configured to obtain its public key certificates from an appropriate certificate policy through an approved service provider.
The ICS must be configured to support organizational requirements to conduct weekly backups of information system documentation, including security-related documentation.
The ICS must be configured to run an operating system release that is currently supported by Ivanti.
The ICS must be configured to conduct backups of system level information contained in the information system when changes occur.
The Juniper EX switch must be configured to enforce organization-defined role-based access control policies over defined subjects and objects.
The Juniper EX switch must be configured to synchronize internal information system clocks using redundant authoritative time sources.
The Juniper EX switch must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.
The Juniper EX switch must be configured to generate log records for a locally developed list of auditable events.
The Juniper EX switch must be configured to enforce access restrictions associated with changes to the system components.
The Juniper EX switch must be configured to use an authentication server for the purpose of authenticating users prior to granting administrative access.
The Juniper EX switch must be configured to conduct backups of system level information contained in the information system when changes occur.
The Juniper EX switch must be configured to obtain its public key certificates from an appropriate certificate policy through an approved service provider.
The Juniper EX switch must be configured with an operating system release that is currently supported by the vendor.
User-managed resources must be created in dedicated namespaces.
The Kubernetes manifest files must have least privileges.
The Juniper PE router providing Virtual Private LAN Services (VPLS) must be configured to have all attachment circuits defined to the virtual forwarding instance (VFI) with the globally unique VPN ID assigned for each customer VLAN.
The Juniper PE router must be configured to enforce the split-horizon rule for all pseudowires within a Virtual Private LAN Services (VPLS) bridge domain.
The Juniper router must be configured to advertise a hop limit of at least 32 in Router Advertisement messages for IPv6 stateless auto-configuration deployments.
The Juniper router must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.
The Kubernetes component manifests must be owned by root.
The Kubernetes component etcd must be owned by etcd.
The Kubernetes conf files must be owned by root.
The Kubernetes Kube Proxy kubeconfig must have file permissions set to 644 or more restrictive.
The Kubernetes Kube Proxy kubeconfig must be owned by root.
The Kubernetes Kubelet certificate authority file must have file permissions set to 644 or more restrictive.
The Kubernetes Kubelet certificate authority must be owned by root.
The Kubernetes component PKI must be owned by root.
The Kubernetes kubelet KubeConfig must have file permissions set to 644 or more restrictive.
The Kubernetes kubelet KubeConfig file must be owned by root.
The Kubernetes kubeadm.conf must be owned by root.
The Kubernetes kubeadm.conf must have file permissions set to 644 or more restrictive.
The Kubernetes kubelet config must have file permissions set to 644 or more restrictive.
The Kubernetes kubelet config must be owned by root.
The Kubernetes etcd must have file permissions set to 644 or more restrictive.
The Kubernetes admin kubeconfig must have file permissions set to 644 or more restrictive.
Kubernetes API Server audit logs must be enabled.
The Kubernetes API Server must be set to audit log max size.
The Kubernetes API Server must be set to audit log maximum backup.
The Kubernetes API Server audit log retention must be set.
The Kubernetes API Server audit log path must be set.
The Kubernetes PKI CRT must have file permissions set to 644 or more restrictive.
The Kubernetes PKI keys must have file permissions set to 600 or more restrictive.
MarkLogic Server must be configured in accordance with the security configuration settings based on DoD security configuration and implementation guidance, including STIGs, NSA configuration guides, CTOs, DTMs, and IAVMs.
MongoDB must be configured in accordance with the security configuration settings based on DoD security configuration and implementation guidance, including STIGs, NSA configuration guides, CTOs, DTMs, and IAVMs.
.Net Framework versions installed on the system must be supported.
.Net applications that invoke NetFx40_LegacySecurityPolicy must apply previous versions of .NET STIG guidance.
.NET default proxy settings must be reviewed and approved.
MariaDB must be configured in accordance with the security configuration settings based on DoD security configuration and implementation guidance, including STIGs, NSA configuration guides, CTOs, DTMs, and IAVMs.
The application must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.
ActiveX controls and plug-ins must be disallowed (Restricted Sites zone).
The Allow META REFRESH property must be disallowed (Restricted Sites zone).
Internet Explorer must be configured to disallow users to change policies.
Internet Explorer must be configured to use machine settings.
Security checking features must be enforced.
All network paths (UNCs) for Intranet sites must be disallowed.
XAML files must be disallowed (Internet zone).
XAML files must be disallowed (Restricted Sites zone).
.NET Framework-reliant components not signed with Authenticode must be disallowed to run (Restricted Sites Zone).
.NET Framework-reliant components signed with Authenticode must be disallowed to run (Restricted Sites Zone).
Security Warning for unsafe files must be set to prompt (Internet zone).
Exchange must be configured in accordance with the security configuration settings based on DOD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.
The IIS 10.0 website must have a unique application pool.
The maximum number of requests an application pool can process for each IIS 10.0 website must be explicitly set.
The application pool for each IIS 10.0 website must have a recycle time explicitly set.
The application pools rapid fail protection for each IIS 10.0 website must be enabled.
The application pools rapid fail protection settings for each IIS 10.0 website must be managed.
The required DoD banner page must be displayed to authenticated users accessing a DoD private website.
Custom user interface (UI) code must be blocked from loading in all Office applications.
Office applications must not load XML expansion packs with Smart Documents.
The Local Machine Zone Lockdown Security must be enabled in all Office programs.
AutoRepublish in Excel must be disabled.
AutoRepublish warning alert in Excel must be enabled.
File extensions must be enabled to match file types in Excel.
Security Warning for unsafe files must be disallowed (Restricted Sites zone).
.NET Framework-reliant components not signed with Authenticode must be disallowed to run (Internet zone).
.NET Framework-reliant components signed with Authenticode must be disallowed to run (Internet zone).
When Enhanced Protected Mode is enabled, ActiveX controls must be disallowed to run in Protected Mode.
All accounts installed with the IIS 10.0 web server software and tools must have passwords assigned and default passwords changed.
Unspecified file extensions on a production IIS 10.0 web server must be removed.
The IIS 10.0 web server must have a global authorization rule configured to restrict access.
The IIS 10.0 web server must enable HTTP Strict Transport Security (HSTS).
Domain-joined systems must use Windows 10 Enterprise Edition 64-bit version.
Windows 10 domain-joined systems must have a Trusted Platform Module (TPM) enabled and ready for use.
Windows 10 systems must have Unified Extensible Firmware Interface (UEFI) firmware and be configured to run in UEFI mode, not Legacy BIOS.
Secure Boot must be enabled on Windows 10 systems.
Windows 10 systems must be maintained at a supported servicing level.
The Windows 10 system must use an anti-virus program.
Alternate operating systems must not be permitted on the same system.
Only accounts responsible for the backup operations must be members of the Backup Operators group.
Files dragged from an Outlook e-mail to the file system must be created in ANSI format.
The junk email protection level must be set to No Automatic Filtering.
Internet must not be included in Safe Zone for picture download in Outlook.
The Publish to Global Address List (GAL) button must be disabled in Outlook.
The Outlook Security Mode must be enabled to always use the Outlook Security Group Policy.
Outlook must be configured to not allow hyperlinks in suspected phishing messages.
SQL Server must configure Customer Feedback and Error Reporting.
SQL Server must configure SQL Server Usage and Error Reporting Auditing.
SQL Server Mirroring endpoint must utilize AES encryption.
SQL Server Service Broker endpoint must utilize AES encryption.
The SQL Server Browser service must be disabled unless specifically required and approved.
If the SQL Server Browser Service is specifically required and approved, SQL instances must be hidden.
Administrators of high-value IT resources must complete required training.
Site IT resources designated as high value by the Authorizing Official (AO) must be remotely managed only via a Windows privileged access workstation (PAW).
Administrative accounts of all high-value IT resources must be assigned to a specific administrative tier in Active Directory to separate highly privileged administrative accounts from less privileged administrative accounts.
A Windows PAW must only be used to manage high-value IT resources assigned to the same tier.
All high-value IT resources must be assigned to a specific administrative tier to separate highly sensitive resources from less sensitive resources.
The Windows PAW must be configured with a vendor-supported version of Windows 11 and applicable security patches that are DOD approved.
A Windows update service must be available to provide software updates for the PAW platform.
The Windows PAW must be configured so that all non-administrative-related applications and functions are blocked or removed from the PAW platform, including but not limited to email, Internet browsing, and line-of-business applications.
Device Guard Code Integrity Policy must be used on the Windows PAW to restrict applications that can run on the system (Device Guard Code Integrity Policy).
Device Guard Code Integrity Policy must be used on the Windows PAW to restrict applications that can run on the system (Device Guard User Mode Code Integrity).
Windows PAWs must be restricted to only allow groups used to manage high-value IT resources and members of the local Administrators group to log on locally.
The domain must be configured to restrict privileged administrator accounts from logging on to lower-tier hosts.
PAWs used to manage Active Directory must only allow groups specifically designated to manage Active Directory, such as Enterprise and Domain Admins and members of the local Administrators group, to log on locally.
The Windows PAW must use a trusted channel for all connections between a PAW and IT resources managed from the PAW.
If several Windows PAWs are set up in virtual machines (VMs) on a host server, the host server must only contain PAW VMs.
The Windows PAW must be configured so that all inbound ports and services to a PAW are blocked except as needed for monitoring, scanning, and management tools or when the inbound communication is a response to an outbound connection request.
The Windows PAW must be configured so that all outbound connections to the Internet from a PAW are blocked.
The local Administrators group on the Windows PAW must only include groups with accounts specifically designated to administer the PAW.
Local privileged groups (excluding Administrators) on the Windows PAW must be restricted to include no members.
Restricted remote administration must be enabled for high-value systems.
If several PAWs are set up in virtual machines (VMs) on a host server, domain administrative accounts used to manage high-value IT resources must not have access to the VM host operating system (OS) (only domain administrative accounts designated to manage PAWs should be able to access the VM host OS).
The network device must be running an operating system release that is currently supported by the vendor.
The network device must be configured to use an authentication server to authenticate users prior to granting administrative access.
The network device must be configured with both an ingress and egress ACL.
Access to default accounts used to support replication must be restricted to authorized DBAs.
Oracle instance names must not contain Oracle version numbers.
Fixed user and public database links must be authorized for use.
A minimum of two Oracle control files must be defined and configured to be stored on separate, archived disks (physical or virtual) or archived partitions on a RAID device.
A minimum of two Oracle redo log groups/files must be defined and configured to be stored on separate, archived physical disks or archived directories on a RAID device.
The Oracle WITH GRANT OPTION privilege must not be granted to non-DBA or non-Application administrator user accounts.
Execute permission must be revoked from PUBLIC for restricted Oracle packages.
The Oracle REMOTE_OS_AUTHENT parameter must be set to FALSE.
The Oracle REMOTE_OS_ROLES parameter must be set to FALSE.
Standard local user accounts must not exist on a system in a domain.
Software certificate installation files must be removed from Windows 10.
A host-based firewall must be installed and enabled on the system.
Inbound exceptions to the firewall on Windows 10 domain workstations must only allow authorized remote management hosts.
Orphaned security identifiers (SIDs) must be removed from user rights on Windows 10.
The system must notify the user when a Bluetooth device attempts to connect.
Administrative accounts must not be used with applications that access the Internet, such as web browsers, or with potential Internet sources, such as email.
IPv6 source routing must be configured to highest protection.
The system must be configured to prevent IP source routing.
The system must be configured to prevent Internet Control Message Protocol (ICMP) redirects from overriding Open Shortest Path First (OSPF) generated routes.
Insecure logons to an SMB server must be disabled.
Simultaneous connections to the internet or a Windows domain must be limited.
Connections to non-domain networks when connected to a domain authenticated network must be blocked.
Wi-Fi Sense must be disabled.
Windows 10 must be configured to enable Remote host allows delegation of non-exportable credentials.
Virtualization Based Security must be enabled on Windows 10 with the platform security level configured to Secure Boot or Secure Boot with DMA Protection.
Credential Guard must be running on Windows 10 domain-joined systems.
Early Launch Antimalware, Boot-Start Driver Initialization Policy must prevent boot drivers.
Group Policy objects must be reprocessed even if they have not changed.
Systems must at least attempt device authentication using certificates.
The setting to allow Microsoft accounts to be optional for modern style apps must be enabled.
Enhanced anti-spoofing for facial recognition must be enabled on Window 10.
If Enhanced diagnostic data is enabled it must be limited to the minimum required to support Windows Analytics.
Windows Telemetry must not be configured to Full.
Windows Update must not obtain updates from other PCs on the internet.
File Explorer shell protocol must run in protected mode.
Users must not be allowed to ignore Windows Defender SmartScreen filter warnings for malicious websites in Microsoft Edge.
Users must not be allowed to ignore Windows Defender SmartScreen filter warnings for unverified files in Microsoft Edge.
Windows 10 must be configured to prevent certificate error overrides in Microsoft Edge.
The password manager function in the Edge browser must be disabled.
The Windows Defender SmartScreen filter for Microsoft Edge must be enabled.
The use of a hardware security device with Windows Hello for Business must be enabled.
Windows 10 must be configured to require a minimum pin length of six characters or greater.
Attachments must be prevented from being downloaded from RSS feeds.
Users must be notified if a web-based program attempts to install software.
Automatically signing in the last interactive user after a system-initiated restart must be disabled.
The Windows Explorer Preview pane must be disabled for Windows 10.
Local accounts with blank passwords must be restricted to prevent access from the network.
The built-in administrator account must be renamed.
The built-in guest account must be renamed.
The computer account password must not be prevented from being reset.
The maximum age for machine account passwords must be configured to 30 days or less.
Caching of logon credentials must be limited.
The Smart Card removal option must be configured to Force Logoff or Lock Workstation.
Anonymous SID/Name translation must not be allowed.
Anonymous enumeration of SAM accounts must not be allowed.
The system must be configured to prevent anonymous users from having the same rights as the Everyone group.
NTLM must be prevented from falling back to a Null session.
PKU2U authentication using online identities must be prevented.
The LanMan authentication level must be set to send NTLMv2 response only, and to refuse LM and NTLM.
The system must be configured to the required LDAP client signing level.
The system must be configured to meet the minimum session security requirement for NTLM SSP based clients.
The system must be configured to meet the minimum session security requirement for NTLM SSP based servers.
The default permissions of global system objects must be increased.
Zone information must be preserved when saving attachments.
Hardened UNC paths must be defined to require mutual authentication and integrity for at least the \\*\SYSVOL and \\*\NETLOGON shares.
Virtualization-based protection of code integrity must be enabled.
Internet Explorer must be disabled for Windows 10.
Domain-joined systems must use Windows 11 Enterprise Edition 64-bit version.
Windows 11 systems must be maintained at a supported servicing level.
The Windows 11 system must use an antivirus program.
Software certificate installation files must be removed from Windows 11.
Inbound exceptions to the firewall on Windows 11 domain workstations must only allow authorized remote management hosts.
Orphaned security identifiers (SIDs) must be removed from user rights on Windows 11.
Administrative accounts must not be used with applications that access the internet, such as web browsers, or with potential internet sources, such as email.
Hardened UNC Paths must be defined to require mutual authentication and integrity for at least the \\*\SYSVOL and \\*\NETLOGON shares.
Windows 11 must be configured to enable Remote host allows delegation of non-exportable credentials.
Virtualization-based Security must be enabled on Windows 11 with the platform security level configured to Secure Boot or Secure Boot with DMA Protection.
Credential Guard must be running on Windows 11 domain-joined systems.
Virtualization-based protection of code integrity must be enabled.
Enhanced anti-spoofing for facial recognition must be enabled on Windows 11.
Enhanced diagnostic data must be limited to the minimum required to support Windows Analytics.
Windows 11 must be configured to require a minimum pin length of six characters or greater.
Internet Explorer must be disabled for Windows 11.
Users with Administrative privileges must have separate accounts for administrative duties and normal operational tasks.
Members of the Backup Operators group must have separate accounts for backup duties and normal operational tasks.
Manually managed application account passwords must be changed at least annually or when a system administrator with knowledge of the password leaves the organization.
Windows Server 2016 domain-joined systems must have a Trusted Platform Module (TPM) enabled and ready for use.
Systems must be maintained at a supported servicing level.
The Windows Server 2016 system must use an anti-virus program.
Servers must have a host-based intrusion detection or prevention system.
Software certificate installation files must be removed from Windows Server 2016.
FTP servers must be configured to prevent anonymous logons.
FTP servers must be configured to prevent access to the system drive.
Orphaned security identifiers (SIDs) must be removed from user rights on Windows 2016.
Secure Boot must be enabled on Windows Server 2016 systems.
Windows 2016 systems must have Unified Extensible Firmware Interface (UEFI) firmware and be configured to run in UEFI mode, not Legacy BIOS.
Internet Protocol version 6 (IPv6) source routing must be configured to the highest protection level to prevent IP source routing.
Source routing must be configured to the highest protection level to prevent Internet Protocol (IP) source routing.
Windows Server 2016 must be configured to prevent Internet Control Message Protocol (ICMP) redirects from overriding Open Shortest Path First (OSPF)-generated routes.
Windows Server 2016 virtualization-based security must be enabled with the platform security level configured to Secure Boot or Secure Boot with DMA Protection.
Early Launch Antimalware, Boot-Start Driver Initialization Policy must prevent boot drivers identified as bad.
Users must be prompted to authenticate when the system wakes from sleep (on battery).
Users must be prompted to authenticate when the system wakes from sleep (plugged in).
Windows Telemetry must be configured to Security or Basic.
Turning off File Explorer heap termination on corruption must be disabled.
Directory data (outside the root DSE) of a non-public directory must be configured to prevent anonymous access.
Domain controllers must be configured to allow reset of machine account passwords.
The password for the krbtgt account on a domain must be reset at least every 180 days.
Caching of logon credentials must be limited.
Windows Server 2016 must be running Credential Guard on domain-joined member servers.
Local accounts with blank passwords must be restricted to prevent access from the network.
Windows Server 2016 built-in administrator account must be renamed.
Windows Server 2016 built-in guest account must be renamed.
The maximum age for machine account passwords must be configured to 30 days or less.
Anonymous enumeration of Security Account Manager (SAM) accounts must not be allowed.
Windows Server 2016 must be configured to prevent anonymous users from having the same permissions as the Everyone group.
Services using Local System that use Negotiate when reverting to NTLM authentication must use the computer identity instead of authenticating anonymously.
The LAN Manager authentication level must be set to send NTLMv2 response only and to refuse LM and NTLM.
Windows Server 2016 must be configured to at least negotiate signing for LDAP client signing.
Session security for NTLM SSP-based clients must be configured to require NTLMv2 session security and 128-bit encryption.
Session security for NTLM SSP-based servers must be configured to require NTLMv2 session security and 128-bit encryption.
The default permissions of global system objects must be strengthened.
The Windows Explorer Preview pane must be disabled for Windows Server 2016.
Windows Server 2019 must be configured to audit logoff successes.
Windows Server 2019 users with Administrative privileges must have separate accounts for administrative duties and normal operational tasks.
Windows Server 2019 administrative accounts must not be used with applications that access the Internet, such as web browsers, or with potential Internet sources, such as email.
Windows Server 2019 members of the Backup Operators group must have separate accounts for backup duties and normal operational tasks.
Windows Server 2019 manually managed application account passwords must be changed at least annually or when a system administrator with knowledge of the password leaves the organization.
Windows Server 2019 domain-joined systems must have a Trusted Platform Module (TPM) enabled and ready for use.
Windows Server 2019 must be maintained at a supported servicing level.
Windows Server 2019 must use an anti-virus program.
Windows Server 2019 must have a host-based intrusion detection or prevention system.
Windows Server 2019 must have software certificate installation files removed.
Windows Server 2019 FTP servers must be configured to prevent anonymous logons.
Windows Server 2019 FTP servers must be configured to prevent access to the system drive.
Windows Server 2019 must have orphaned security identifiers (SIDs) removed from user rights.
Windows Server 2019 systems must have Unified Extensible Firmware Interface (UEFI) firmware and be configured to run in UEFI mode, not Legacy BIOS.
Windows Server 2019 must have Secure Boot enabled.
Windows Server 2019 Internet Protocol version 6 (IPv6) source routing must be configured to the highest protection level to prevent IP source routing.
Windows Server 2019 source routing must be configured to the highest protection level to prevent Internet Protocol (IP) source routing.
Windows Server 2019 must be configured to prevent Internet Control Message Protocol (ICMP) redirects from overriding Open Shortest Path First (OSPF)-generated routes.
Windows Server 2019 insecure logons to an SMB server must be disabled.
Windows Server 2019 hardened Universal Naming Convention (UNC) paths must be defined to require mutual authentication and integrity for at least the \\*\SYSVOL and \\*\NETLOGON shares.
Windows Server 2019 must be configured to enable Remote host allows delegation of non-exportable credentials.
Windows Server 2019 virtualization-based security must be enabled with the platform security level configured to Secure Boot or Secure Boot with DMA Protection.
Windows Server 2019 Early Launch Antimalware, Boot-Start Driver Initialization Policy must prevent boot drivers identified as bad.
Windows Server 2019 group policy objects must be reprocessed even if they have not changed.
Windows Server 2019 users must be prompted to authenticate when the system wakes from sleep (on battery).
Windows Server 2019 users must be prompted to authenticate when the system wakes from sleep (plugged in).
Windows Server 2019 Telemetry must be configured to Security or Basic.
Windows Server 2019 Windows Update must not obtain updates from other PCs on the Internet.
Windows Server 2019 Turning off File Explorer heap termination on corruption must be disabled.
Windows Server 2019 File Explorer shell protocol must run in protected mode.
Windows Server 2019 must prevent attachments from being downloaded from RSS feeds.
Windows Server 2019 users must be notified if a web-based program attempts to install software.
Windows Server 2019 directory data (outside the root DSE) of a non-public directory must be configured to prevent anonymous access.
Windows Server 2019 domain controllers must be configured to allow reset of machine account passwords.
Windows Server 2019 must limit the caching of logon credentials to four or less on domain-joined member servers.
Windows Server 2019 must be running Credential Guard on domain-joined member servers.
Windows Server 2019 must prevent local accounts with blank passwords from being used from the network.
Windows Server 2019 built-in administrator account must be renamed.
Windows Server 2019 built-in guest account must be renamed.
Windows Server 2019 maximum age for machine account passwords must be configured to 30 days or less.
Windows Server 2019 Smart Card removal option must be configured to Force Logoff or Lock Workstation.
Windows Server 2019 must not allow anonymous SID/Name translation.
Windows Server 2019 must not allow anonymous enumeration of Security Account Manager (SAM) accounts.
Windows Server 2019 must be configured to prevent anonymous users from having the same permissions as the Everyone group.
Windows Server 2019 services using Local System that use Negotiate when reverting to NTLM authentication must use the computer identity instead of authenticating anonymously.
Windows Server 2019 must prevent NTLM from falling back to a Null session.
Windows Server 2019 must prevent PKU2U authentication using online identities.
Windows Server 2019 LAN Manager authentication level must be configured to send NTLMv2 response only and to refuse LM and NTLM.
Windows Server 2019 must be configured to at least negotiate signing for LDAP client signing.
Windows Server 2019 session security for NTLM SSP-based clients must be configured to require NTLMv2 session security and 128-bit encryption.
Windows Server 2019 session security for NTLM SSP-based servers must be configured to require NTLMv2 session security and 128-bit encryption.
Windows Server 2019 default permissions of global system objects must be strengthened.
Windows Server 2019 must preserve zone information when saving attachments.
Windows Server 2019 must disable automatically signing in the last interactive user after a system-initiated restart.
Windows Server 2019 must have a host-based firewall installed and enabled.
The Windows Explorer Preview pane must be disabled for Windows Server 2019.
Windows Server 2022 administrative accounts must not be used with applications that access the internet, such as web browsers, or with potential internet sources, such as email.
Windows Server 2022 members of the Backup Operators group must have separate accounts for backup duties and normal operational tasks.
Windows Server 2022 manually managed application account passwords must be changed at least annually or when a system administrator with knowledge of the password leaves the organization.
Windows Server 2022 domain-joined systems must have a Trusted Platform Module (TPM) enabled and ready for use.
Windows Server 2022 must be maintained at a supported servicing level.
Windows Server 2022 must use an antivirus program.
Windows Server 2022 must have a host-based intrusion detection or prevention system.
Windows Server 2022 must have software certificate installation files removed.
Windows Server 2022 must have a host-based firewall installed and enabled.
Windows Server 2022 FTP servers must be configured to prevent anonymous logons.
Windows Server 2022 FTP servers must be configured to prevent access to the system drive.
Windows Server 2022 must have orphaned security identifiers (SIDs) removed from user rights.
Windows Server 2022 systems must have Unified Extensible Firmware Interface (UEFI) firmware and be configured to run in UEFI mode, not Legacy BIOS.
Windows Server 2022 must have Secure Boot enabled.
Windows Server 2022 Internet Protocol version 6 (IPv6) source routing must be configured to the highest protection level to prevent IP source routing.
Windows Server 2022 source routing must be configured to the highest protection level to prevent Internet Protocol (IP) source routing.
Windows Server 2022 must be configured to prevent Internet Control Message Protocol (ICMP) redirects from overriding Open Shortest Path First (OSPF)-generated routes.
Windows Server 2022 insecure logons to an SMB server must be disabled.
Windows Server 2022 hardened Universal Naming Convention (UNC) paths must be defined to require mutual authentication and integrity for at least the \\*\SYSVOL and \\*\NETLOGON shares.
Windows Server 2022 must be configured to enable Remote host allows delegation of nonexportable credentials.
Windows Server 2022 virtualization-based security must be enabled with the platform security level configured to Secure Boot or Secure Boot with DMA Protection.
Windows Server 2022 Early Launch Antimalware, Boot-Start Driver Initialization Policy must prevent boot drivers identified as bad.
Windows Server 2022 group policy objects must be reprocessed even if they have not changed.
Windows Server 2022 users must be prompted to authenticate when the system wakes from sleep (on battery).
Windows Server 2022 users must be prompted to authenticate when the system wakes from sleep (plugged in).
Windows Server 2022 Diagnostic Data must be configured to send "required diagnostic data" or "optional diagnostic data".
Windows Server 2022 Windows Update must not obtain updates from other PCs on the internet.
Windows Server 2022 Turning off File Explorer heap termination on corruption must be disabled.
Windows Server 2022 File Explorer shell protocol must run in protected mode.
Windows Server 2022 must prevent attachments from being downloaded from RSS feeds.
Windows Server 2022 users must be notified if a web-based program attempts to install software.
Windows Server 2022 must disable automatically signing in the last interactive user after a system-initiated restart.
Windows Server 2022 directory data (outside the root DSE) of a nonpublic directory must be configured to prevent anonymous access.
Windows Server 2022 domain controllers must be configured to allow reset of machine account passwords.
Windows Server 2022 must limit the caching of logon credentials to four or less on domain-joined member servers.
Windows Server 2022 must be running Credential Guard on domain-joined member servers.
Windows Server 2022 must prevent local accounts with blank passwords from being used from the network.
Windows Server 2022 built-in administrator account must be renamed.
Windows Server 2022 built-in guest account must be renamed.
Windows Server 2022 maximum age for machine account passwords must be configured to 30 days or less.
Windows Server 2022 Smart Card removal option must be configured to Force Logoff or Lock Workstation.
Windows Server 2022 must not allow anonymous SID/Name translation.
Windows Server 2022 must not allow anonymous enumeration of Security Account Manager (SAM) accounts.
Windows Server 2022 must be configured to prevent anonymous users from having the same permissions as the Everyone group.
Windows Server 2022 services using Local System that use Negotiate when reverting to NTLM authentication must use the computer identity instead of authenticating anonymously.
Windows Server 2022 must prevent NTLM from falling back to a Null session.
Windows Server 2022 must prevent PKU2U authentication using online identities.
Windows Server 2022 LAN Manager authentication level must be configured to send NTLMv2 response only and to refuse LM and NTLM.
Windows Server 2022 must be configured to at least negotiate signing for LDAP client signing.
Windows Server 2022 session security for NTLM SSP-based clients must be configured to require NTLMv2 session security and 128-bit encryption.
Windows Server 2022 session security for NTLM SSP-based servers must be configured to require NTLMv2 session security and 128-bit encryption.
Windows Server 2022 default permissions of global system objects must be strengthened.
Windows Server 2022 must preserve zone information when saving attachments.
Sensor traffic in transit must be protected at all times via an Out-of-Band (OOB) network or an encrypted tunnel between site locations.
Intrusion Detection and Prevention System (IDPS) traffic between the sensor and the security management or sensor data collection servers must traverse a dedicated Virtual Local Area Network (VLAN) logically separating IDPS traffic from all other enclave traffic.
Products collecting baselines for anomaly-based detection must have their baselines rebuilt based on changes to mission requirements such as Information Operations Conditions (INFOCON) levels and when the traffic patterns are expected to change significantly.
If a Secure File Transfer Protocol (SFTP) server is used to provide updates to the sensors, the server must be configured to allow read-only access to the files within the directory on which the signature packs are placed.
If an automated scheduler is used to provide updates to the sensors, an account on the file server must be defined that will provide access to the signatures only to the sensors.
The Intrusion Detection and Prevention System (IDPS) configuration must be backed up before applying software or signature updates, or when making changes to the configuration.
The Intrusion Detection and Prevention System (IDPS) file checksums provided by the vendor must be compared and verified with checksums computed from CD or downloaded files.
The organization must establish weekly data backup procedures for the network Intrusion Detection and Prevention System (IDPS) data.
The Intrusion Detection and Prevention System (IDPS) software and signatures must be updated when updates are provided by the vendor.
The organization must ensure all switches and associated cross-connect hardware are kept in a secure Intermediate Distribution Frame (IDF) or an enclosed cabinet that is kept locked.
All global address ranges used on unclassified and classified networks must be properly registered with the DoD Network Information Center (NIC).
Network Address Translation (NAT) and private IP address space must not be deployed within the SIPRNet enclave.
All Internet-facing applications must be hosted in a DoD Demilitarized Zone (DMZ) Extension.
Two Network Time Protocol (NTP) servers must be deployed in the management network.
A policy must be implemented to keep Bogon/Martian rulesets up to date.
A dedicated management network must be implemented.
An Out-of-Band (OOB) management network must be deployed or 24x7 personnel must have console access for device management.
All Releasable Local Area Network (REL LAN) environments must be documented in the System Security Authorization Agreement (SSAA).
Annual reviews must be performed on all Releasable Local Area Network (REL LAN) environments.
Enabling a connection that extends DISN IP network connectivity (e.g., NIPRNet and SIPRNet) to any DoD Vendor, Foreign, or Federal Mission Partner enclave or network without a signed DoD CIO approved sponsorship memo is prohibited. For classified connectivity it must be to a DSS approved contractor facility or DoD Component approved foreign government facility.
Command and Control (C2) and non-C2 exceptions of SIPRNet must be documented in the enclaves accreditation package and an Authority to Connect (ATC) or Interim ATC amending the connection approval received prior to implementation.
VPN gateways used to create IP tunnels to transport classified traffic across an unclassified IP network must comply with appropriate physical security protection standards for processing classified information.
Rapid Spanning Tree Protocol (STP) must be implemented at the access and distribution layers where Virtual Local Area Networks (VLANs) span multiple switches.
First-hop redundancy services must be configured to delay any preempt to provide enough time for the Internet Gateway Protocol (IGP) to stabilize.
DoD Components providing guest WLAN access (internet access only) must use separate WLAN or logical segmentation of the enterprise WLAN (e.g., separate service set identifier [SSID] and virtual LAN) or DoD network.
OL 8 must be a vendor-supported release.
OL 8 vendor-packaged system security patches and updates must be installed and up to date.
The Oracle SQL92_SECURITY parameter must be set to TRUE.
The Oracle password file ownership and permissions should be limited and the REMOTE_LOGIN_PASSWORDFILE parameter must be set to EXCLUSIVE or NONE.
System privileges granted using the WITH ADMIN OPTION must not be granted to unauthorized user accounts.
System Privileges must not be granted to PUBLIC.
Oracle roles granted using the WITH ADMIN OPTION must not be granted to unauthorized accounts.
Object permissions granted to PUBLIC must be restricted.
The Oracle Listener must be configured to require administration authentication.
Application role permissions must not be assigned to the Oracle PUBLIC role.
Oracle application administration roles must be disabled if not required and authorized.
Connections by mid-tier web and application systems to the Oracle DBMS from a DMZ or external network must be encrypted.
Database job/batch queues must be reviewed regularly to detect unauthorized database job submissions.
Unauthorized database links must not be defined and active.
Sensitive information from production database exports must be modified before being imported into a development database.
Only authorized system accounts must have the SYSTEM tablespace specified as the default tablespace.
Application owner accounts must have a dedicated application tablespace.
The directories assigned to the LOG_ARCHIVE_DEST* parameters must be protected from unauthorized access.
The Oracle _TRACE_FILES_PUBLIC parameter if present must be set to FALSE.
Application object owner accounts must be disabled when not performing installation or maintenance actions.
DBMS production application and data directories must be protected from developers on shared production/development DBMS host systems.
Use of the DBMS installation account must be logged.
The directory assigned to the AUDIT_FILE_DEST parameter must be protected from unauthorized access and must be stored in a dedicated directory or disk partition separate from software or other application files.
Access to DBMS software files and directories must not be granted to unauthorized users.
Replication accounts must not be granted DBA privileges.
Network access to the DBMS must be restricted to authorized personnel.
Changes to configuration options must be audited.
Changes to DBMS security labels must be audited.
Remote database or other external access must use fully-qualified names.
The /diag subdirectory under the directory assigned to the DIAGNOSTIC_DEST parameter must be protected from unauthorized access.
Remote administration must be disabled for the Oracle connection manager.
The SQLNet SQLNET.ALLOWED_LOGON_VERSION parameter must be set to a value of 12 or higher.
DBA OS accounts must be granted only those host system privileges necessary for the administration of the DBMS.
DBMS default accounts must be assigned custom passwords.
The DBMS must provide a mechanism to automatically identify accounts designated as temporary or emergency accounts.
The DBMS must provide a mechanism to automatically terminate accounts designated as temporary or emergency accounts after an organization-defined time period.
A single database connection configuration file must not be used to configure all database clients.
The DBMS must be protected from unauthorized access by developers on shared production/development host systems.
The DBA role must not be assigned excessive or unauthorized privileges.
The DBMS must specify an account lockout duration that is greater than or equal to the organization-approved minimum.
The DBMS must have the capability to limit the number of failed login attempts based upon an organization-defined number of consecutive invalid attempts occurring within an organization-defined time period.
Database backup procedures must be defined, documented, and implemented.
Database recovery procedures must be developed, documented, implemented, and periodically tested.
The DBMS must disable user accounts after 35 days of inactivity.
DBMS passwords must not be stored in compiled, encoded, or encrypted batch jobs or compiled, encoded, or encrypted application source code.
The DBMS must employ cryptographic mechanisms to protect the integrity and confidentiality of non-local maintenance and diagnostic communications.
The DBMS must employ strong identification and authentication techniques when establishing non-local maintenance and diagnostic sessions.
Database data files containing sensitive information must be encrypted.
The DBMS must automatically terminate emergency accounts after an organization-defined time period for each type of account.
The DBMS must support taking organization-defined list of least disruptive actions to terminate suspicious events.
WLAN SSIDs must be changed from the manufacturer's default to a pseudo random word that does not identify the unit, base, organization, etc.
Wireless access points and bridges must be placed in dedicated subnets outside the enclave's perimeter.
Connections by mid-tier web and application systems to the Oracle DBMS from a DMZ or external network must be encrypted.
Sensitive information from production database exports must be modified before import to a development database.
The DBMS data files, transaction logs and audit files must be stored in dedicated directories or disk partitions separate from software or other application files.
Network client connections must be restricted to supported versions.
Processes (services, applications, etc.) that connect to the DBMS independently of individual users, must use valid, current DoD approved PKI certificates for authentication to the DBMS.
Applications must obscure feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals.
When using command-line tools such as Oracle SQL*Plus, which can accept a plain-text password, users must use an alternative logon method that does not expose the password.
The DBMS must allocate audit record storage capacity in accordance with organization-defined audit record storage requirements.
The DBMS must provide a mechanism to automatically remove or disable temporary user accounts after 72 hours.
The DBMS must verify account lockouts persist until reset by an administrator.
The DBMS must set the maximum number of consecutive invalid logon attempts to three.
The Oracle Linux operating system must not allow accounts configured with blank or null passwords.
The Oracle Linux operating system must be configured so that the delay between logon prompts following a failed console logon attempt is at least four seconds.
The Oracle Linux operating system must not allow an unattended or automatic logon to the system via a graphical user interface.
The Oracle Linux operating system must not allow an unrestricted logon to the system.
The Oracle Linux operating system must not allow users to override SSH environment variables.
The Oracle Linux operating system must not allow a non-certificate trusted host SSH logon to the system.
The Oracle Linux operating system must be configured to disable USB mass storage.
The Oracle Linux operating system must be configured so that the x86 Ctrl-Alt-Delete key sequence is disabled on the command line.
The Oracle Linux operating system must define default permissions for all authenticated users in such a way that the user can only read and modify their own files.
The Oracle Linux operating system must be a vendor supported release.
The Oracle Linux operating system security patches and updates must be installed and up to date.
The Oracle Linux operating system must not have unnecessary accounts.
The Oracle Linux operating system must be configured so that the root account must be the only account having unrestricted access to the system.
The Oracle Linux operating system must be configured so that all files and directories have a valid owner.
The Oracle Linux operating system must be configured so that all files and directories have a valid group owner.
The Oracle Linux operating system must be configured so that all local interactive user accounts, upon creation, are assigned a home directory.
The Oracle Linux operating system must be configured so that all local interactive users have a home directory assigned and defined in the /etc/passwd file.
The Oracle Linux operating system must be configured so that all local interactive user home directories have mode 0750 or less permissive.
The Oracle Linux operating system must be configured so that all local interactive user home directories are owned by their respective users.
The Oracle Linux operating system must be configured so that all local interactive user home directories are group-owned by the home directory owners primary group.
The Oracle Linux operating system must be configured so that all files and directories contained in local interactive user home directories have a valid owner.
The Oracle Linux operating system must be configured so that all files and directories contained in local interactive user home directories are group-owned by a group of which the home directory owner is a member.
The Oracle Linux operating system must be configured so that all files and directories contained in local interactive user home directories have a mode of 0750 or less permissive.
The Oracle Linux operating system must be configured so that all local initialization files for interactive users are owned by the home directory user or root.
The Oracle Linux operating system must be configured so that all local initialization files for local interactive users are be group-owned by the users primary group or root.
The Oracle Linux operating system must be configured so that all local initialization files have mode 0740 or less permissive.
The Oracle Linux operating system must be configured so that all local interactive user initialization files executable search paths contain only paths that resolve to the users home directory.
The Oracle Linux operating system must be configured so that local initialization files do not execute world-writable programs.
The Oracle Linux operating system must be configured so that all system device files are correctly labeled to prevent unauthorized modification.
The Oracle Linux operating system must be configured so that file systems containing user home directories are mounted to prevent files with the setuid and setgid bit set from being executed.
The Oracle Linux operating system must prevent files with the setuid and setgid bit set from being executed on file systems that are used with removable media.
The Oracle Linux operating system must prevent files with the setuid and setgid bit set from being executed on file systems that are being imported via Network File System (NFS).
The Oracle Linux operating system must prevent binary files from being executed on file systems that are being imported via Network File System (NFS).
The Oracle Linux operating system must be configured so that all world-writable directories are group-owned by root, sys, bin, or an application group.
The Oracle Linux operating system must set the umask value to 077 for all local interactive user accounts.
The Oracle Linux operating system must have cron logging implemented.
The Oracle Linux operating system must be configured so that the cron.allow file, if it exists, is owned by root.
The Oracle Linux operating system must be configured so that the cron.allow file, if it exists, is group-owned by root.
The Oracle Linux operating system must disable Kernel core dumps unless needed.
The Oracle Linux operating system must be configured so that a separate file system is used for user home directories (such as /home or an equivalent).
The Oracle Linux operating system must use a separate file system for /var.
The Oracle Linux operating system must use a separate file system for /tmp (or equivalent).
The Oracle Linux operating system must be configured so that the file integrity tool is configured to verify Access Control Lists (ACLs).
The Oracle Linux operating system must be configured so that the file integrity tool is configured to verify extended attributes.
The Oracle Linux operating system must use a file integrity tool that is configured to use FIPS 140-2 approved cryptographic hashes for validating file contents and directories.
The Oracle Linux operating system must send rsyslog output to a log aggregation server.
The Oracle Linux operating system must be configured so that the rsyslog daemon does not accept log messages from other servers unless the server is being used for log aggregation.
The Oracle Linux operating system must use a virus scan program.
The Oracle Linux operating system must be configured so that the SSH daemon does not allow authentication using RSA rhosts authentication.
The Oracle Linux operating system must be configured so that the SSH daemon does not allow authentication using rhosts authentication.
The Oracle Linux operating system must not permit direct logons to the root account using remote access via SSH.
The Oracle Linux operating system must be configured so that the SSH daemon does not allow authentication using known hosts authentication.
The Oracle Linux operating system must be configured so that the SSH public host key files have mode 0644 or less permissive.
The Oracle Linux operating system must be configured so the SSH private host key files have mode 0640 or less permissive.
The Oracle Linux operating system must be configured so that the SSH daemon performs strict mode checking of home directory configuration files.
The Oracle Linux operating system must be configured so that the SSH daemon uses privilege separation.
The Oracle Linux operating system must be configured so that the SSH daemon does not allow compression or only allows compression after successful authentication.
The Oracle Linux operating system must enable an application firewall, if available.
The Oracle Linux operating system must not contain .shosts files.
The Oracle Linux operating system must not contain shosts.equiv files.
For Oracle Linux operating systems using DNS resolution, at least two name servers must be configured.
The Oracle Linux operating system must not forward Internet Protocol version 4 (IPv4) source-routed packets.
The Oracle Linux operating system must use a reverse-path filter for IPv4 network traffic when possible on all interfaces.
The Oracle Linux operating system must use a reverse-path filter for IPv4 network traffic when possible by default.
The Oracle Linux operating system must not forward Internet Protocol version 4 (IPv4) source-routed packets by default.
The Oracle Linux operating system must not respond to Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) echoes sent to a broadcast address.
The Oracle Linux operating system must prevent Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirect messages from being accepted.
The Oracle Linux operating system must ignore Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirect messages.
The Oracle Linux operating system must not allow interfaces to perform Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirects by default.
The Oracle Linux operating system must not send Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirects.
Network interfaces configured on The Oracle Linux operating system must not be in promiscuous mode.
The Oracle Linux operating system must be configured to prevent unrestricted mail relaying.
The Oracle Linux operating system must not have a File Transfer Protocol (FTP) server package installed unless needed.
The Oracle Linux operating system must not have the Trivial File Transfer Protocol (TFTP) server package installed if not required for operational support.
The Oracle Linux operating system must be configured so that remote X connections are disabled, unless to fulfill documented and validated mission requirements.
The Oracle Linux operating system must be configured so that if the Trivial File Transfer Protocol (TFTP) server is required, the TFTP daemon is configured to operate in secure mode.
The Oracle Linux operating system must not have a graphical display manager installed unless approved.
The Oracle Linux operating system must not be performing packet forwarding unless the system is a router.
The Oracle Linux operating system must be configured so that the Network File System (NFS) is configured to use RPCSEC_GSS.
SNMP community strings on the Oracle Linux operating system must be changed from the default.
The Oracle Linux operating system access control program must be configured to grant or deny system access to specific hosts and services.
The Oracle Linux operating system must not have unauthorized IP tunnels configured.
The Oracle Linux operating system must not forward IPv6 source-routed packets.
The Oracle Linux operating system must be configured so the x86 Ctrl-Alt-Delete key sequence is disabled in the Graphical User Interface.
The Oracle Linux operating system must be configured so that all world-writable directories are owned by root, sys, bin, or an application user.
The Oracle Linux operating system must disable the graphical user interface automounter unless required.
The Oracle Linux operating system SSH daemon must prevent remote hosts from connecting to the proxy display.
The Oracle Linux operating system must restrict privilege elevation to authorized personnel.
The Oracle Linux operating system must not have accounts configured with blank or null passwords.
The Oracle Linux operating system must specify the default "include" directory for the /etc/sudoers file.
The Oracle Linux operating system must disable the login screen user list for graphical user interfaces.
The OL 8 SSH server must be configured to use strong entropy.
OL 8 must restrict privilege elevation to authorized personnel.
OL 8 must use the invoking user's password for privilege escalation when using "sudo".
OL 8 must not let Meltdown and Spectre exploit critical vulnerabilities in modern processors.
There must be no "shosts.equiv" files on the OL 8 operating system.
There must be no ".shosts" files on the OL 8 operating system.
OL 8 must enable the hardware random number generator entropy gatherer service.
OL 8 must have the packages required to use the hardware random number generator entropy gatherer service.
The OL 8 SSH public host key files must have mode "0644" or less permissive.
The OL 8 SSH private host key files must have mode "0640" or less permissive.
The OL 8 SSH daemon must perform strict mode checking of home directory configuration files.
The OL 8 SSH daemon must not allow authentication using known host's authentication.
The OL 8 SSH daemon must not allow Kerberos authentication, except to fulfill documented and validated mission requirements.
The OL 8 SSH daemon must not allow GSSAPI authentication, except to fulfill documented and validated mission requirements.
OL 8 must use a separate file system for "/var".
OL 8 must use a separate file system for "/var/log".
OL 8 must use a separate file system for the system audit data path.
OL 8 must use a separate file system for "/tmp".
OL 8 must use a separate file system for /var/tmp.
OL 8 must have the rsyslog service enabled and active.
OL 8 must prevent files with the setuid and setgid bit set from being executed on file systems that contain user home directories.
OL 8 must prevent files with the setuid and setgid bit set from being executed on the /boot directory.
OL 8 must prevent files with the setuid and setgid bit set from being executed on the /boot/efi directory.
OL 8 must prevent special devices on non-root local partitions.
OL 8 file systems that contain user home directories must not execute binary files.
OL 8 file systems must not interpret character or block special devices from untrusted file systems.
OL 8 file systems must not execute binary files on removable media.
OL 8 must prevent files with the setuid and setgid bit set from being executed on file systems that are used with removable media.
OL 8 file systems must not execute binary files that are imported via Network File System (NFS).
OL 8 file systems must not interpret character or block special devices that are imported via NFS.
OL 8 must prevent files with the setuid and setgid bit set from being executed on file systems that are imported via Network File System (NFS).
Local OL 8 initialization files must not execute world-writable programs.
OL 8 must disable the "kernel.core_pattern".
OL 8 must disable acquiring, saving, and processing core dumps.
OL 8 must disable core dumps for all users.
OL 8 must disable storing core dumps.
OL 8 must disable core dump backtraces.
For OL 8 systems using Domain Name Servers (DNS) resolution, at least two name servers must be configured.
Executable search paths within the initialization files of all local interactive OL 8 users must only contain paths that resolve to the system default or the user's home directory.
All OL 8 world-writable directories must be owned by root, sys, bin, or an application user.
All OL 8 world-writable directories must be group-owned by root, sys, bin, or an application group.
All OL 8 local interactive users must have a home directory assigned in the "/etc/passwd" file.
All OL 8 local interactive user home directories must have mode "0750" or less permissive.
All OL 8 local interactive user home directory files must have mode "0750" or less permissive.
All OL 8 local interactive user home directories must be group-owned by the home directory owner's primary group.
OL 8 must be configured so that all files and directories contained in local interactive user home directories are group-owned by a group of which the home directory owner is a member.
All OL 8 local interactive user home directories defined in the "/etc/passwd" file must exist.
All OL 8 local interactive user accounts must be assigned a home directory upon creation.
All OL 8 local initialization files must have mode "0740" or less permissive.
All OL 8 files and directories must have a valid owner.
All OL 8 files and directories must have a valid group owner.
A separate OL 8 filesystem must be used for user home directories (such as "/home" or an equivalent).
Unattended or automatic logon via the OL 8 graphical user interface must not be allowed.
OL 8 must not allow users to override SSH environment variables.
OL 8 must disable the user list at logon for graphical user interfaces.
OL 8 must ensure the password complexity module is enabled in the password-auth file.
OL 8 must prevent the use of dictionary words for passwords.
OL 8 must enforce a delay of at least four seconds between logon prompts following a failed logon attempt.
OL 8 must not have unnecessary accounts.
OL 8 must not allow accounts configured with blank or null passwords.
OL 8 must not allow blank or null passwords in the system-auth file.
OL 8 must not allow blank or null passwords in the password-auth file.
OL 8 default permissions must be defined in such a way that all authenticated users can read and modify only their own files.
OL 8 must set the umask value to 077 for all local interactive user accounts.
OL 8 must define default permissions for logon and non-logon shells.
Cron logging must be implemented in OL 8.
The OL 8 audit system must audit local events.
OL 8 must resolve audit information before writing to disk.
OL 8 must have the packages required for offloading audit logs installed.
OL 8 must have the packages required for encrypting offloaded audit logs installed.
OL 8 must not have the asynchronous transfer mode (ATM) kernel module installed if not required for operational support.
OL 8 must not have the Controller Area Network (CAN) kernel module installed if not required for operational support.
OL 8 must not have the stream control transmission protocol (SCTP) kernel module installed if not required for operational support.
The x86 Ctrl-Alt-Delete key sequence must be disabled on OL 8.
The x86 Ctrl-Alt-Delete key sequence in OL 8 must be disabled if a graphical user interface is installed.
OL 8 must disable the systemd Ctrl-Alt-Delete burst key sequence.
OL 8 must disable the debug-shell systemd service.
The Trivial File Transfer Protocol (TFTP) server package must not be installed if not required for OL 8 operational support.
The root account must be the only account having unrestricted access to the OL 8 system.
OL 8 must prevent IPv4 Internet Control Message Protocol (ICMP) redirect messages from being accepted.
OL 8 must prevent IPv6 Internet Control Message Protocol (ICMP) redirect messages from being accepted.
OL 8 must not send Internet Control Message Protocol (ICMP) redirects.
OL 8 must not respond to Internet Control Message Protocol (ICMP) echoes sent to a broadcast address.
OL 8 must not forward IPv4 source-routed packets.
OL 8 must not forward IPv6 source-routed packets.
OL 8 must not forward IPv4 source-routed packets by default.
OL 8 must not forward IPv6 source-routed packets by default.
OL 8 must not enable IPv6 packet forwarding unless the system is a router.
OL 8 must not accept router advertisements on all IPv6 interfaces.
OL 8 must not accept router advertisements on all IPv6 interfaces by default.
OL 8 must not allow interfaces to perform Internet Control Message Protocol (ICMP) redirects by default.
OL 8 must ignore IPv4 Internet Control Message Protocol (ICMP) redirect messages.
OL 8 must ignore IPv6 Internet Control Message Protocol (ICMP) redirect messages.
OL 8 must disable access to the network "bpf" syscall from unprivileged processes.
OL 8 must restrict the use of "ptrace" to descendant processes.
OL 8 must restrict exposed kernel pointer addresses access.
OL 8 must disable the use of user namespaces.
OL 8 must use reverse path filtering on all IPv4 interfaces.
OL 8 must enable hardening for the Berkeley Packet Filter Just-in-time compiler.
OL 8 must be configured to prevent unrestricted mail relaying.
The OL 8 file integrity tool must be configured to verify extended attributes.
The OL 8 file integrity tool must be configured to verify Access Control Lists (ACLs).
The graphical display manager must not be installed on OL 8 unless approved.
OL 8 network interfaces must not be in promiscuous mode.
OL 8 remote X connections for interactive users must be disabled unless to fulfill documented and validated mission requirements.
The OL 8 SSH daemon must prevent remote hosts from connecting to the proxy display.
If the Trivial File Transfer Protocol (TFTP) server is required, the OL 8 TFTP daemon must be configured to operate in secure mode.
A File Transfer Protocol (FTP) server package must not be installed unless mission essential on OL 8.
OL 8 must not have the "gssproxy" package installed if not required for operational support.
OL 8 must not have the "iprutils" package installed if not required for operational support.
OL 8 must not have the "tuned" package installed if not required for operational support.
The OL 8 operating system must not have accounts configured with blank or null passwords.
OL 8 must specify the default "include" directory for the /etc/sudoers file.
OL 8 must ensure the password complexity module is enabled in the system-auth file.
OL 8 systems below version 8.4 must ensure the password complexity module in the system-auth file is configured for three retries or less.
OL 8 systems below version 8.4 must ensure the password complexity module in the password-auth file is configured for three retries or less.
OL 8 systems, version 8.4 and above, must ensure the password complexity module is configured for three retries or less.
OL 8 must not enable IPv4 packet forwarding unless the system is a router.
The graphical display manager must not be the default target on OL 8 unless approved.
The MySQL Database Server 8.0 must be configured in accordance with the security configuration settings based on DoD security configuration and implementation guidance, including STIGs, NSA configuration guides, CTOs, DTMs, and IAVMs.
The Palo Alto Networks security platform must inspect inbound and outbound SMTP and Extended SMTP communications traffic (if authorized) for protocol compliance and protocol anomalies.
The Palo Alto Networks security platform must inspect inbound and outbound FTP and FTPS communications traffic (if authorized) for protocol compliance and protocol anomalies.
The Palo Alto Networks security platform must inspect inbound and outbound HTTP traffic (if authorized) for protocol compliance and protocol anomalies.
The Palo Alto Networks security platform must uniquely identify and authenticate organizational administrators (or processes acting on behalf of organizational administrators).
Administrators in the role of Security Administrator, Cryptographic Administrator, or Audit Administrator must not also have the role of Audit Administrator.
The Palo Alto Networks security platform must automatically lock the account until the locked account is released by an administrator when three unsuccessful logon attempts in 15 minutes are exceeded.
The Palo Alto Networks security platform must generate an immediate alert when allocated audit record storage volume reaches 75% of repository maximum audit record storage capacity.
The Palo Alto Networks security platform must compare internal information system clocks at least every 24 hours with an authoritative time server.
The Palo Alto Networks security platform must synchronize internal information system clocks to the authoritative time source when the time difference is greater than one second.
The Palo Alto Networks security platform must be configured to synchronize internal information system clocks with the primary and secondary time sources located in different geographic regions using redundant authoritative time sources.
The Palo Alto Networks security platform must accept and verify Personal Identity Verification (PIV) credentials.
The Palo Alto Networks security platform must allow the use of a temporary password for system logons with an immediate change to a permanent password.
The Palo Alto Networks security platform must use automated mechanisms to alert security personnel to threats identified by authoritative sources (e.g., CTOs) and IAW CJCSM 6510.01B.
The Palo Alto Networks security platform must employ centrally managed authentication server(s).
The Palo Alto Networks security platform must use DoD-approved PKI rather than proprietary or self-signed device certificates.
The Palo Alto Networks security platform must not use Password Profiles.
The Palo Alto Networks security platform must not use the default admin account password.
The Palo Alto Networks security platform must generate an audit log record when the Data Plane CPU utilization is 100%.
Redis Enterprise DBMS must be configured in accordance with the security configuration settings based on DoD security configuration and implementation guidance, including STIGs, NSA configuration guides, CTOs, DTMs, and IAVMs.
Rancher RKE2 components must be configured in accordance with the security configuration settings based on DOD security configuration or implementation guidance, including SRGs, STIGs, NSA configuration guides, CTOs, and DTMs.
OpenShift must generate audit records for all DOD-defined auditable events within all components in the platform.
OpenShift must continuously scan components, containers, and images for vulnerabilities.
RHEL 8 vendor packaged system security patches and updates must be installed and up to date.
RHEL 8 must ensure the SSH server uses strong entropy.
All accounts installed with the Automation Controller NGINX web server's software and tools must have passwords assigned and default passwords changed.
The Red Hat Enterprise Linux operating system must not allow accounts configured with blank or null passwords.
The Red Hat Enterprise Linux operating system must be configured so that the delay between logon prompts following a failed console logon attempt is at least four seconds.
The Red Hat Enterprise Linux operating system must not allow an unattended or automatic logon to the system via a graphical user interface.
The Red Hat Enterprise Linux operating system must not allow an unrestricted logon to the system.
The Red Hat Enterprise Linux operating system must not allow users to override SSH environment variables.
The Red Hat Enterprise Linux operating system must not allow a non-certificate trusted host SSH logon to the system.
The Red Hat Enterprise Linux operating system must be configured to disable USB mass storage.
The Red Hat Enterprise Linux operating system must disable the file system automounter unless required.
The Red Hat Enterprise Linux operating system must be configured so that the x86 Ctrl-Alt-Delete key sequence is disabled on the command line.
The Red Hat Enterprise Linux operating system must be configured so that the x86 Ctrl-Alt-Delete key sequence is disabled in the Graphical User Interface.
The Red Hat Enterprise Linux operating system must define default permissions for all authenticated users in such a way that the user can only read and modify their own files.
The Red Hat Enterprise Linux operating system must be a vendor supported release.
The Red Hat Enterprise Linux operating system security patches and updates must be installed and up to date.
The Red Hat Enterprise Linux operating system must not have unnecessary accounts.
The Red Hat Enterprise Linux operating system must be configured so that the root account must be the only account having unrestricted access to the system.
The Red Hat Enterprise Linux operating system must be configured so that all local interactive user accounts, upon creation, are assigned a home directory.
The Red Hat Enterprise Linux operating system must be configured so that all local interactive users have a home directory assigned and defined in the /etc/passwd file.
The Red Hat Enterprise Linux operating system must be configured so that all local interactive user home directories have mode 0750 or less permissive.
The Red Hat Enterprise Linux operating system must be configured so that all local interactive user home directories are owned by their respective users.
The Red Hat Enterprise Linux operating system must be configured so that all local interactive user home directories are group-owned by the home directory owners primary group.
The Red Hat Enterprise Linux operating system must be configured so that all files and directories contained in local interactive user home directories have a valid owner.
The Red Hat Enterprise Linux operating system must be configured so that all files and directories contained in local interactive user home directories are group-owned by a group of which the home directory owner is a member.
The Red Hat Enterprise Linux operating system must be configured so that all files and directories contained in local interactive user home directories have a mode of 0750 or less permissive.
The Red Hat Enterprise Linux operating system must be configured so that all local initialization files for interactive users are owned by the home directory user or root.
The Red Hat Enterprise Linux operating system must be configured so that all local initialization files for local interactive users are be group-owned by the users primary group or root.
The Red Hat Enterprise Linux operating system must be configured so that all local initialization files have mode 0740 or less permissive.
The Red Hat Enterprise Linux operating system must be configured so that all local interactive user initialization files executable search paths contain only paths that resolve to the users home directory.
The Red Hat Enterprise Linux operating system must be configured so that local initialization files do not execute world-writable programs.
The Red Hat Enterprise Linux operating system must be configured so that file systems containing user home directories are mounted to prevent files with the setuid and setgid bit set from being executed.
The Red Hat Enterprise Linux operating system must prevent files with the setuid and setgid bit set from being executed on file systems that are used with removable media.
The Red Hat Enterprise Linux operating system must prevent files with the setuid and setgid bit set from being executed on file systems that are being imported via Network File System (NFS).
The Red Hat Enterprise Linux operating system must prevent binary files from being executed on file systems that are being imported via Network File System (NFS).
The Red Hat Enterprise Linux operating system must be configured so that all world-writable directories are group-owned by root, sys, bin, or an application group.
The Red Hat Enterprise Linux operating system must have cron logging implemented.
The Red Hat Enterprise Linux operating system must be configured so that the cron.allow file, if it exists, is owned by root.
The Red Hat Enterprise Linux operating system must be configured so that the cron.allow file, if it exists, is group-owned by root.
The Red Hat Enterprise Linux operating system must disable Kernel core dumps unless needed.
The Red Hat Enterprise Linux operating system must be configured so that a separate file system is used for user home directories (such as /home or an equivalent).
The Red Hat Enterprise Linux operating system must use a separate file system for /var.
The Red Hat Enterprise Linux operating system must use a separate file system for the system audit data path.
The Red Hat Enterprise Linux operating system must use a separate file system for /tmp (or equivalent).
The Red Hat Enterprise Linux operating system must be configured so that the file integrity tool is configured to verify Access Control Lists (ACLs).
The Red Hat Enterprise Linux operating system must be configured so that the file integrity tool is configured to verify extended attributes.
The Red Hat Enterprise Linux operating system must use a file integrity tool that is configured to use FIPS 140-2 approved cryptographic hashes for validating file contents and directories.
There must be no shosts.equiv files on the RHEL 8 operating system.
There must be no .shosts files on the RHEL 8 operating system.
RHEL 8 must enable the hardware random number generator entropy gatherer service.
The RHEL 8 SSH public host key files must have mode 0644 or less permissive.
The RHEL 8 SSH private host key files must have mode 0640 or less permissive.
The RHEL 8 SSH daemon must perform strict mode checking of home directory configuration files.
The RHEL 8 SSH daemon must not allow authentication using known host’s authentication.
The RHEL 8 SSH daemon must not allow Kerberos authentication, except to fulfill documented and validated mission requirements.
RHEL 8 must use a separate file system for /var.
RHEL 8 must use a separate file system for /var/log.
RHEL 8 must use a separate file system for the system audit data path.
A separate RHEL 8 filesystem must be used for the /tmp directory.
The rsyslog service must be running in RHEL 8.
RHEL 8 must prevent files with the setuid and setgid bit set from being executed on file systems that contain user home directories.
RHEL 8 must prevent files with the setuid and setgid bit set from being executed on the /boot directory.
RHEL 8 must prevent special devices on non-root local partitions.
RHEL 8 must prevent code from being executed on file systems that contain user home directories.
RHEL 8 must prevent special devices on file systems that are used with removable media.
RHEL 8 must prevent code from being executed on file systems that are used with removable media.
RHEL 8 must prevent files with the setuid and setgid bit set from being executed on file systems that are used with removable media.
RHEL 8 must prevent code from being executed on file systems that are imported via Network File System (NFS).
RHEL 8 must prevent special devices on file systems that are imported via Network File System (NFS).
RHEL 8 must prevent files with the setuid and setgid bit set from being executed on file systems that are imported via Network File System (NFS).
Local RHEL 8 initialization files must not execute world-writable programs.
RHEL 8 must disable kernel dumps unless needed.
RHEL 8 must disable the kernel.core_pattern.
RHEL 8 must disable acquiring, saving, and processing core dumps.
RHEL 8 must disable core dumps for all users.
RHEL 8 must disable storing core dumps.
RHEL 8 must disable core dump backtraces.
For RHEL 8 systems using Domain Name Servers (DNS) resolution, at least two name servers must be configured.
Executable search paths within the initialization files of all local interactive RHEL 8 users must only contain paths that resolve to the system default or the users home directory.
All RHEL 8 world-writable directories must be owned by root, sys, bin, or an application user.
All RHEL 8 world-writable directories must be group-owned by root, sys, bin, or an application group.
All RHEL 8 local interactive users must have a home directory assigned in the /etc/passwd file.
All RHEL 8 local interactive user home directories must have mode 0750 or less permissive.
All RHEL 8 local interactive user home directories must be group-owned by the home directory owner’s primary group.
All RHEL 8 local interactive user home directories defined in the /etc/passwd file must exist.
All RHEL 8 local interactive user accounts must be assigned a home directory upon creation.
All RHEL 8 local initialization files must have mode 0740 or less permissive.
All RHEL 8 local files and directories must have a valid owner.
All RHEL 8 local files and directories must have a valid group owner.
A separate RHEL 8 filesystem must be used for user home directories (such as /home or an equivalent).
Unattended or automatic logon via the RHEL 8 graphical user interface must not be allowed.
RHEL 8 must not allow users to override SSH environment variables.
RHEL 8 must ensure the password complexity module is enabled in the password-auth file.
RHEL 8 must prevent the use of dictionary words for passwords.
RHEL 8 must enforce a delay of at least four seconds between logon prompts following a failed logon attempt.
RHEL 8 must not have unnecessary accounts.
RHEL 8 must not allow accounts configured with blank or null passwords.
RHEL 8 must define default permissions for all authenticated users in such a way that the user can only read and modify their own files.
RHEL 8 must set the umask value to 077 for all local interactive user accounts.
RHEL 8 must define default permissions for logon and non-logon shells.
Cron logging must be implemented in RHEL 8.
The RHEL 8 audit system must audit local events.
RHEL 8 must resolve audit information before writing to disk.
The Red Hat Enterprise Linux operating system must send rsyslog output to a log aggregation server.
The Red Hat Enterprise Linux 7 operating system must implement DoD-approved encryption to protect the confidentiality of SSH connections.
The Red Hat Enterprise Linux operating system must implement virtual address space randomization.
The Red Hat Enterprise Linux operating system must be configured so that the SSH daemon does not allow authentication using RSA rhosts authentication.
The Red Hat Enterprise Linux operating system must be configured so that the SSH daemon does not allow authentication using rhosts authentication.
The Red Hat Enterprise Linux operating system must not permit direct logons to the root account using remote access via SSH.
The Red Hat Enterprise Linux operating system must be configured so that the SSH daemon does not allow authentication using known hosts authentication.
The Red Hat Enterprise Linux operating system must be configured so that the SSH daemon is configured to only use the SSHv2 protocol.
The Red Hat Enterprise Linux operating system must be configured so that the SSH public host key files have mode 0644 or less permissive.
The Red Hat Enterprise Linux operating system must be configured so that the SSH private host key files have mode 0640 or less permissive.
The Red Hat Enterprise Linux operating system must be configured so that the SSH daemon performs strict mode checking of home directory configuration files.
The Red Hat Enterprise Linux operating system must be configured so that the SSH daemon uses privilege separation.
The Red Hat Enterprise Linux operating system must be configured so that the SSH daemon does not allow compression or only allows compression after successful authentication.
The Red Hat Enterprise Linux operating system must enable an application firewall, if available.
The Red Hat Enterprise Linux operating system must not contain .shosts files.
The Red Hat Enterprise Linux operating system must not contain shosts.equiv files.
For Red Hat Enterprise Linux operating systems using DNS resolution, at least two name servers must be configured.
The Red Hat Enterprise Linux operating system must not forward Internet Protocol version 4 (IPv4) source-routed packets.
The Red Hat Enterprise Linux operating system must use a reverse-path filter for IPv4 network traffic when possible on all interfaces.
The Red Hat Enterprise Linux operating system must use a reverse-path filter for IPv4 network traffic when possible by default.
The Red Hat Enterprise Linux operating system must not forward Internet Protocol version 4 (IPv4) source-routed packets by default.
The Red Hat Enterprise Linux operating system must not respond to Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) echoes sent to a broadcast address.
The Red Hat Enterprise Linux operating system must prevent Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirect messages from being accepted.
The Red Hat Enterprise Linux operating system must ignore Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirect messages.
The Red Hat Enterprise Linux operating system must not allow interfaces to perform Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirects by default.
The Red Hat Enterprise Linux operating system must not send Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirects.
Network interfaces configured on the Red Hat Enterprise Linux operating system must not be in promiscuous mode.
The Red Hat Enterprise Linux operating system must be configured to prevent unrestricted mail relaying.
The Red Hat Enterprise Linux operating system must not have a File Transfer Protocol (FTP) server package installed unless needed.
The Red Hat Enterprise Linux operating system must be configured so that remote X connections are disabled except to fulfill documented and validated mission requirements.
The Red Hat Enterprise Linux operating system must be configured so that if the Trivial File Transfer Protocol (TFTP) server is required, the TFTP daemon is configured to operate in secure mode.
RHEL 8 must have the packages required for offloading audit logs installed.
RHEL 8 must have the packages required for encrypting offloaded audit logs installed.
The x86 Ctrl-Alt-Delete key sequence must be disabled on RHEL 8.
The x86 Ctrl-Alt-Delete key sequence in RHEL 8 must be disabled if a graphical user interface is installed.
The systemd Ctrl-Alt-Delete burst key sequence in RHEL 8 must be disabled.
The debug-shell systemd service must be disabled on RHEL 8.
The Trivial File Transfer Protocol (TFTP) server package must not be installed if not required for RHEL 8 operational support.
The root account must be the only account having unrestricted access to the RHEL 8 system.
RHEL 8 must prevent IPv6 Internet Control Message Protocol (ICMP) redirect messages from being accepted.
RHEL 8 must not send Internet Control Message Protocol (ICMP) redirects.
RHEL 8 must not respond to Internet Control Message Protocol (ICMP) echoes sent to a broadcast address.
RHEL 8 must not forward IPv6 source-routed packets.
RHEL 8 must not forward IPv6 source-routed packets by default.
RHEL 8 must not enable IPv6 packet forwarding unless the system is a router.
RHEL 8 must not accept router advertisements on all IPv6 interfaces.
The Red Hat Enterprise Linux operating system must not have a graphical display manager installed unless approved.
The Red Hat Enterprise Linux operating system must not be performing packet forwarding unless the system is a router.
The Red Hat Enterprise Linux operating system must be configured so that the Network File System (NFS) is configured to use RPCSEC_GSS.
SNMP community strings on the Red Hat Enterprise Linux operating system must be changed from the default.
The Red Hat Enterprise Linux operating system access control program must be configured to grant or deny system access to specific hosts and services.
The Red Hat Enterprise Linux operating system must not have unauthorized IP tunnels configured.
The Red Hat Enterprise Linux operating system must not forward IPv6 source-routed packets.
The Red Hat Enterprise Linux operating system must implement the Endpoint Security for Linux Threat Prevention tool.
The Red Hat Enterprise Linux operating system must use a virus scan program.
The Red Hat Enterprise Linux operating system must disable the graphical user interface automounter unless required.
The Red Hat Enterprise Linux operating system must be configured so that all world-writable directories are owned by root, sys, bin, or an application user.
The Red Hat Enterprise Linux operating system SSH daemon must prevent remote hosts from connecting to the proxy display.
The Red Hat Enterprise Linux operating system must restrict privilege elevation to authorized personnel.
The Red Hat Enterprise Linux operating system must not have accounts configured with blank or null passwords.
The Red Hat Enterprise Linux operating system must specify the default "include" directory for the /etc/sudoers file.
The Red Hat Enterprise Linux operating system must disable the login screen user list for graphical user interfaces.
The SUSE operating system must enforce a delay of at least four (4) seconds between logon prompts following a failed logon attempt.
The SUSE operating system must not be configured to allow blank or null passwords.
The SUSE operating system must prevent the use of dictionary words for passwords.
The SUSE operating system must enforce a delay of at least four seconds between logon prompts following a failed logon attempt.
The SUSE operating system must not allow unattended or automatic logon via the graphical user interface.
There must be no .shosts files on the SUSE operating system.
There must be no shosts.equiv files on the SUSE operating system.
RHEL 8 must not accept router advertisements on all IPv6 interfaces by default.
RHEL 8 must not allow interfaces to perform Internet Control Message Protocol (ICMP) redirects by default.
RHEL 8 must ignore IPv6 Internet Control Message Protocol (ICMP) redirect messages.
RHEL 8 must disable access to network bpf syscall from unprivileged processes.
RHEL 8 must restrict usage of ptrace to descendant processes.
RHEL 8 must restrict exposed kernel pointer addresses access.
RHEL 8 must disable the use of user namespaces.
RHEL 8 must use reverse path filtering on all IPv4 interfaces.
RHEL 8 must be configured to prevent unrestricted mail relaying.
The RHEL 8 file integrity tool must be configured to verify extended attributes.
The RHEL 8 file integrity tool must be configured to verify Access Control Lists (ACLs).
The graphical display manager must not be installed on RHEL 8 unless approved.
RHEL 8 network interfaces must not be in promiscuous mode.
RHEL 8 remote X connections for interactive users must be disabled unless to fulfill documented and validated mission requirements.
The RHEL 8 SSH daemon must prevent remote hosts from connecting to the proxy display.
If the Trivial File Transfer Protocol (TFTP) server is required, the RHEL 8 TFTP daemon must be configured to operate in secure mode.
A File Transfer Protocol (FTP) server package must not be installed unless mission essential on RHEL 8.
The iprutils package must not be installed unless mission essential on RHEL 8.
The tuned package must not be installed unless mission essential on RHEL 8.
RHEL 8 must restrict privilege elevation to authorized personnel.
RHEL 8 must have the packages required to use the hardware random number generator entropy gatherer service.
The RHEL 8 SSH daemon must not allow GSSAPI authentication, except to fulfill documented and validated mission requirements.
RHEL 8 must use a separate file system for /var/tmp.
RHEL 8 must prevent files with the setuid and setgid bit set from being executed on the /boot/efi directory.
All RHEL 8 local interactive user home directory files must have mode 0750 or less permissive.
RHEL 8 must be configured so that all files and directories contained in local interactive user home directories are group-owned by a group of which the home directory owner is a member.
RHEL 8 must disable the user list at logon for graphical user interfaces.
RHEL 8 must not allow blank or null passwords in the system-auth file.
RHEL 8 must not allow blank or null passwords in the password-auth file.
RHEL 8 must prevent IPv4 Internet Control Message Protocol (ICMP) redirect messages from being accepted.
RHEL 8 must not forward IPv4 source-routed packets.
RHEL 8 must not forward IPv4 source-routed packets by default.
RHEL 8 must ignore IPv4 Internet Control Message Protocol (ICMP) redirect messages.
RHEL 8 must enable hardening for the Berkeley Packet Filter Just-in-time compiler.
RHEL 8 must not enable IPv4 packet forwarding unless the system is a router.
The RHEL 8 operating system must not have accounts configured with blank or null passwords.
RHEL 8 must specify the default "include" directory for the /etc/sudoers file.
RHEL 8 must ensure the password complexity module is enabled in the system-auth file.
RHEL 8 systems below version 8.4 must ensure the password complexity module in the system-auth file is configured for three retries or less.
RHEL 8 systems below version 8.4 must ensure the password complexity module in the password-auth file is configured for three retries or less.
RHEL 8 systems, version 8.4 and above, must ensure the password complexity module is configured for three retries or less.
The graphical display manager must not be the default target on RHEL 8 unless approved.
RHEL 9 must be a vendor-supported release.
RHEL 9 vendor packaged system security patches and updates must be installed and up to date.
The graphical display manager must not be the default target on RHEL 9 unless approved.
RHEL 9 must enable the hardware random number generator entropy gatherer service.
The systemd Ctrl-Alt-Delete burst key sequence in RHEL 9 must be disabled.
The x86 Ctrl-Alt-Delete key sequence must be disabled on RHEL 9.
RHEL 9 debug-shell systemd service must be disabled.
RHEL 9 must disable the ability of systemd to spawn an interactive boot process.
RHEL 9 /boot/grub2/grub.cfg file must be group-owned by root.
RHEL 9 /boot/grub2/grub.cfg file must be owned by root.
RHEL 9 must disable virtual system calls.
RHEL 9 must clear the page allocator to prevent use-after-free attacks.
RHEL 9 must prevent the loading of a new kernel for later execution.
RHEL 9 must restrict exposed kernel pointer addresses access.
RHEL 9 must disable the kernel.core_pattern.
RHEL 9 must implement address space layout randomization (ASLR) to protect its memory from unauthorized code execution.
RHEL 9 must disable access to network bpf system call from nonprivileged processes.
RHEL 9 must restrict usage of ptrace to descendant processes.
RHEL 9 must disable core dump backtraces.
RHEL 9 must disable storing core dumps.
RHEL 9 must disable core dumps for all users.
RHEL 9 must disable acquiring, saving, and processing core dumps.
RHEL 9 must disable the use of user namespaces.
The kdump service on RHEL 9 must be disabled.
RHEL 9 must be configured so that the cryptographic hashes of system files match vendor values.
RHEL 9 must not have a File Transfer Protocol (FTP) server package installed.
RHEL 9 must not have the sendmail package installed.
RHEL 9 must not have the gssproxy package installed.
RHEL 9 must not have the iprutils package installed.
RHEL 9 must not have the tuned package installed.
RHEL 9 must not have a Trivial File Transfer Protocol (TFTP) server package installed.
RHEL 9 must not have the quagga package installed.
A graphical display manager must not be installed on RHEL 9 unless approved.
RHEL 9 must have the gnutls-utils package installed.
RHEL 9 must have the nss-tools package installed.
RHEL 9 must have the rng-tools package installed.
A separate RHEL 9 file system must be used for user home directories (such as /home or an equivalent).
RHEL 9 must use a separate file system for /tmp.
RHEL 9 must use a separate file system for /var.
RHEL 9 must use a separate file system for /var/log.
RHEL 9 must use a separate file system for the system audit data path.
RHEL 9 must use a separate file system for /var/tmp.
RHEL 9 file system automount function must be disabled unless required.
RHEL 9 must prevent files with the setuid and setgid bit set from being executed on file systems that contain user home directories.
RHEL 9 must prevent code from being executed on file systems that contain user home directories.
RHEL 9 must be configured so that the Network File System (NFS) is configured to use RPCSEC_GSS.
RHEL 9 must prevent special devices on file systems that are imported via Network File System (NFS).
RHEL 9 must prevent code from being executed on file systems that are imported via Network File System (NFS).
RHEL 9 must prevent files with the setuid and setgid bit set from being executed on file systems that are imported via Network File System (NFS).
RHEL 9 must prevent code from being executed on file systems that are used with removable media.
RHEL 9 must prevent special devices on file systems that are used with removable media.
RHEL 9 must prevent files with the setuid and setgid bit set from being executed on file systems that are used with removable media.
RHEL 9 must prevent files with the setuid and setgid bit set from being executed on the /boot directory.
RHEL 9 must prevent files with the setuid and setgid bit set from being executed on the /boot/efi directory.
RHEL 9 must prevent special devices on non-root local partitions.
RHEL 9 cron configuration directories must have a mode of 0700 or less permissive.
All RHEL 9 local initialization files must have mode 0740 or less permissive.
The SUSE operating system file integrity tool must be configured to verify Access Control Lists (ACLs).
The SUSE operating system file integrity tool must be configured to verify extended attributes.
The SUSE operating system must disable the file system automounter unless required.
The SUSE operating system must disable the x86 Ctrl-Alt-Delete key sequence.
The SUSE operating system must disable the x86 Ctrl-Alt-Delete key sequence for Graphical User Interfaces.
The SUSE operating system default permissions must be defined in such a way that all authenticated users can only read and modify their own files.
The SUSE operating system must not have unnecessary accounts.
The SUSE operating system root account must be the only account having unrestricted access to the system.
All SUSE operating system local interactive users must have a home directory assigned in the /etc/passwd file.
All SUSE operating system local interactive user accounts, upon creation, must be assigned a home directory.
All SUSE operating system local interactive user home directories defined in the /etc/passwd file must exist.
All SUSE operating system local interactive user home directories must have mode 0750 or less permissive.
All SUSE operating system local interactive user home directories must be group-owned by the home directory owners primary group.
All SUSE operating system local initialization files must have mode 0740 or less permissive.
All SUSE operating system local interactive user initialization files executable search paths must contain only paths that resolve to the users home directory.
All SUSE operating system local initialization files must not execute world-writable programs.
SUSE operating system file systems that contain user home directories must be mounted to prevent files with the setuid and setgid bit set from being executed.
SUSE operating system file systems that are used with removable media must be mounted to prevent files with the setuid and setgid bit set from being executed.
SUSE operating system file systems that are being imported via Network File System (NFS) must be mounted to prevent files with the setuid and setgid bit set from being executed.
SUSE operating system file systems that are being imported via Network File System (NFS) must be mounted to prevent binary files from being executed.
All SUSE operating system world-writable directories must be group-owned by root, sys, bin, or an application group.
SUSE operating system kernel core dumps must be disabled unless needed.
A separate file system must be used for SUSE operating system user home directories (such as /home or an equivalent).
The SUSE operating system must use a separate file system for /var.
The SUSE operating system must use a separate file system for the system audit data path.
The SUSE operating system must be configured to not overwrite Pluggable Authentication Modules (PAM) configuration on package changes.
SUSE operating system audit records must contain information to establish what type of events occurred, the source of events, where events occurred, and the outcome of events.
The SUSE operating system must not disable syscall auditing.
All RHEL 9 local interactive user home directories must have mode 0750 or less permissive.
RHEL 9 /etc/group file must have mode 0644 or less permissive to prevent unauthorized access.
RHEL 9 /etc/group- file must have mode 0644 or less permissive to prevent unauthorized access.
RHEL 9 /etc/gshadow file must have mode 0000 or less permissive to prevent unauthorized access.
RHEL 9 /etc/gshadow- file must have mode 0000 or less permissive to prevent unauthorized access.
RHEL 9 /etc/passwd file must have mode 0644 or less permissive to prevent unauthorized access.
RHEL 9 /etc/passwd- file must have mode 0644 or less permissive to prevent unauthorized access.
RHEL 9 /etc/shadow- file must have mode 0000 or less permissive to prevent unauthorized access.
RHEL 9 /etc/group file must be owned by root.
RHEL 9 /etc/group file must be group-owned by root.
RHEL 9 /etc/group- file must be owned by root.
RHEL 9 /etc/group- file must be group-owned by root.
RHEL 9 /etc/gshadow file must be owned by root.
RHEL 9 /etc/gshadow file must be group-owned by root.
RHEL 9 /etc/gshadow- file must be owned by root.
RHEL 9 /etc/gshadow- file must be group-owned by root.
RHEL 9 /etc/passwd file must be owned by root.
RHEL 9 /etc/passwd file must be group-owned by root.
RHEL 9 /etc/passwd- file must be owned by root.
RHEL 9 /etc/passwd- file must be group-owned by root.
RHEL 9 /etc/shadow file must be owned by root.
RHEL 9 /etc/shadow file must be group-owned by root.
RHEL 9 /etc/shadow- file must be owned by root.
RHEL 9 /etc/shadow- file must be group-owned by root.
RHEL 9 cron configuration files directory must be owned by root.
RHEL 9 cron configuration files directory must be group-owned by root.
All RHEL 9 world-writable directories must be owned by root, sys, bin, or an application user.
All RHEL 9 local files and directories must have a valid group owner.
All RHEL 9 local files and directories must have a valid owner.
RHEL 9 must be configured so that all system device files are correctly labeled to prevent unauthorized modification.
RHEL 9 /etc/crontab file must have mode 0600.
RHEL 9 /etc/shadow file must have mode 0000 to prevent unauthorized access.
RHEL 9 must have the firewalld package installed.
The firewalld service on RHEL 9 must be active.
A RHEL 9 firewall must employ a deny-all, allow-by-exception policy for allowing connections to other systems.
RHEL 9 network interfaces must not be in promiscuous mode.
RHEL 9 must enable hardening for the Berkeley Packet Filter just-in-time compiler.
RHEL 9 systems using Domain Name Servers (DNS) resolution must have at least two name servers configured.
RHEL 9 must configure a DNS processing mode set be Network Manager.
RHEL 9 must not have unauthorized IP tunnels configured.
RHEL 9 must be configured to prevent unrestricted mail relaying.
If the Trivial File Transfer Protocol (TFTP) server is required, RHEL 9 TFTP daemon must be configured to operate in secure mode.
RHEL 9 libreswan package must be installed.
There must be no shosts.equiv files on RHEL 9.
There must be no .shosts files on RHEL 9.
RHEL 9 must be configured to use TCP syncookies.
RHEL 9 must ignore Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirect messages.
RHEL 9 must not forward Internet Protocol version 4 (IPv4) source-routed packets.
RHEL 9 must log IPv4 packets with impossible addresses.
RHEL 9 must log IPv4 packets with impossible addresses by default.
RHEL 9 must use reverse path filtering on all IPv4 interfaces.
RHEL 9 must prevent IPv4 Internet Control Message Protocol (ICMP) redirect messages from being accepted.
RHEL 9 must not forward IPv4 source-routed packets by default.
RHEL 9 must use a reverse-path filter for IPv4 network traffic when possible by default.
RHEL 9 must not respond to Internet Control Message Protocol (ICMP) echoes sent to a broadcast address.
RHEL 9 must limit the number of bogus Internet Control Message Protocol (ICMP) response errors logs.
RHEL 9 must not send Internet Control Message Protocol (ICMP) redirects.
RHEL 9 must not allow interfaces to perform Internet Control Message Protocol (ICMP) redirects by default.
RHEL 9 must not enable IPv4 packet forwarding unless the system is a router.
RHEL 9 must not accept router advertisements on all IPv6 interfaces.
RHEL 9 must ignore IPv6 Internet Control Message Protocol (ICMP) redirect messages.
RHEL 9 must not forward IPv6 source-routed packets.
RHEL 9 must not enable IPv6 packet forwarding unless the system is a router.
RHEL 9 must not accept router advertisements on all IPv6 interfaces by default.
RHEL 9 must prevent IPv6 Internet Control Message Protocol (ICMP) redirect messages from being accepted.
RHEL 9 must not forward IPv6 source-routed packets by default.
RHEL 9 must have the openssh-clients package installed.
The SUSE operating system must not allow automatic logon via SSH.
The SUSE operating system must not allow users to override SSH environment variables.
The SUSE operating system must implement DoD-approved encryption to protect the confidentiality of SSH remote connections.
The SUSE operating system SSH daemon must be configured to not allow authentication using known hosts authentication.
The SUSE operating system SSH daemon public host key files must have mode 0644 or less permissive.
The SUSE operating system SSH daemon private host key files must have mode 0640 or less permissive.
The SUSE operating system SSH daemon must perform strict mode checking of home directory configuration files.
The SUSE operating system SSH daemon must use privilege separation.
The SUSE operating system SSH daemon must not allow compression or must only allow compression after successful authentication.
The SUSE operating system SSH daemon must disable forwarded remote X connections for interactive users, unless to fulfill documented and validated mission requirements.
The SUSE operating system must not forward Internet Protocol version 4 (IPv4) source-routed packets.
The SUSE operating system must not forward Internet Protocol version 6 (IPv6) source-routed packets.
The SUSE operating system must not forward Internet Protocol version 4 (IPv4) source-routed packets by default.
The SUSE operating system must not respond to Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) echoes sent to a broadcast address.
The SUSE operating system must prevent Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirect messages from being accepted.
The SUSE operating system must not allow interfaces to accept Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirect messages by default.
The SUSE operating system must not allow interfaces to accept Internet Protocol version 6 (IPv6) Internet Control Message Protocol (ICMP) redirect messages by default.
The SUSE operating system must not allow interfaces to send Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirect messages by default.
The SUSE operating system must not send Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirects.
The SUSE operating system must not be performing Internet Protocol version 4 (IPv4) packet forwarding unless the system is a router.
The SUSE operating system must not have network interfaces in promiscuous mode unless approved and documented.
The SUSE operating system SSH daemon must prevent remote hosts from connecting to the proxy display.
The SUSE operating system must restrict privilege elevation to authorized personnel.
The SUSE operating system must not have unnecessary account capabilities.
The SUSE operating system must not forward Internet Protocol version 6 (IPv6) source-routed packets by default.
The SUSE operating system must prevent Internet Protocol version 6 (IPv6) Internet Control Message Protocol (ICMP) redirect messages from being accepted.
The SUSE operating system must not be performing Internet Protocol version 6 (IPv6) packet forwarding unless the system is a router.
The SUSE operating system must not be performing Internet Protocol version 6 (IPv6) packet forwarding by default unless the system is a router.
The SUSE operating system must specify the default "include" directory for the /etc/sudoers file.
The SUSE operating system must not have accounts configured with blank or null passwords.
RHEL 9 SSHD must not allow blank passwords.
RHEL 9 must not permit direct logons to the root account using remote access via SSH.
RHEL 9 must not allow a noncertificate trusted host SSH logon to the system.
RHEL 9 must not allow users to override SSH environment variables.
RHEL 9 SSH server configuration file must be group-owned by root.
RHEL 9 SSH server configuration file must be owned by root.
RHEL 9 SSH server configuration file must have mode 0600 or less permissive.
RHEL 9 SSH private host key files must have mode 0640 or less permissive.
RHEL 9 SSH public host key files must have mode 0644 or less permissive.
RHEL 9 SSH daemon must not allow compression or must only allow compression after successful authentication.
RHEL 9 SSH daemon must not allow GSSAPI authentication.
RHEL 9 SSH daemon must not allow Kerberos authentication.
RHEL 9 SSH daemon must not allow rhosts authentication.
RHEL 9 SSH daemon must not allow known hosts authentication.
RHEL 9 SSH daemon must disable remote X connections for interactive users.
RHEL 9 SSH daemon must perform strict mode checking of home directory configuration files.
RHEL 9 SSH daemon must display the date and time of the last successful account logon upon an SSH logon.
RHEL 9 SSH daemon must be configured to use privilege separation.
RHEL 9 SSH daemon must prevent remote hosts from connecting to the proxy display.
RHEL 9 must disable the graphical user interface automount function unless required.
RHEL 9 must prevent a user from overriding the disabling of the graphical user interface automount function.
RHEL 9 must prevent a user from overriding the disabling of the graphical user interface autorun function.
RHEL 9 must not allow unattended or automatic logon via the graphical user interface.
RHEL 9 effective dconf policy must match the policy keyfiles.
RHEL 9 must disable the ability of a user to restart the system from the login screen.
RHEL 9 must prevent a user from overriding the disable-restart-buttons setting for the graphical user interface.
RHEL 9 must disable the ability of a user to accidentally press Ctrl-Alt-Del and cause a system to shut down or reboot.
RHEL 9 must prevent a user from overriding the Ctrl-Alt-Del sequence settings for the graphical user interface.
RHEL 9 must disable the user list at logon for graphical user interfaces.
RHEL 9 must be configured to disable USB mass storage.
All RHEL 9 local interactive user accounts must be assigned a home directory upon creation.
RHEL 9 must set the umask value to 077 for all local interactive user accounts.
RHEL 9 system accounts must not have an interactive login shell.
Executable search paths within the initialization files of all local interactive RHEL 9 users must only contain paths that resolve to the system default or the users home directory.
All RHEL 9 local interactive users must have a home directory assigned in the /etc/passwd file.
All RHEL 9 local interactive user home directories defined in the /etc/passwd file must exist.
All RHEL 9 local interactive user home directories must be group-owned by the home directory owner's primary group.
RHEL 9 must not have unauthorized accounts.
The root account must be the only account having unrestricted access to RHEL 9 system.
Local RHEL 9 initialization files must not execute world-writable programs.
RHEL 9 must enforce a delay of at least four seconds between logon prompts following a failed logon attempt.
RHEL 9 must define default permissions for the bash shell.
RHEL 9 must define default permissions for the c shell.
RHEL 9 must define default permissions for all authenticated users in such a way that the user can only read and modify their own files.
RHEL 9 must define default permissions for the system default profile.
RHEL 9 must display the date and time of the last successful account logon upon logon.
RHEL 9 must have policycoreutils package installed.
RHEL 9 policycoreutils-python-utils package must be installed.
RHEL 9 must use the invoking user's password for privilege escalation when using "sudo".
RHEL 9 must restrict privilege elevation to authorized personnel.
RHEL 9 must not allow blank or null passwords.
RHEL 9 must ensure the password complexity module is enabled in the password-auth file.
RHEL 9 must ensure the password complexity module is enabled in the system-auth file.
RHEL 9 must enforce password complexity rules for the root account.
RHEL 9 must prevent the use of dictionary words for passwords.
RHEL 9 must not have accounts configured with blank or null passwords.
RHEL 9 must use a file integrity tool that is configured to use FIPS 140-3-approved cryptographic hashes for validating file contents and directories.
RHEL 9 must be configured so that the file integrity tool verifies Access Control Lists (ACLs).
RHEL 9 must be configured so that the file integrity tool verifies extended attributes.
RHEL 9 must have the rsyslog package installed.
RHEL 9 must have the packages required for encrypting offloaded audit logs installed.
The rsyslog service on RHEL 9 must be active.
RHEL 9 must be configured so that the rsyslog daemon does not accept log messages from other servers unless the server is being used for log aggregation.
RHEL 9 must be configured to forward audit records via TCP to a different system or media from the system being audited via rsyslog.
RHEL 9 must use cron logging.
RHEL 9 audit system must audit local events.
RHEL 9 must produce audit records containing information to establish the identity of any individual or process associated with the event.
RHEL 9 must write audit records to disk.
The SUSE operating system root account must be the only account with unrestricted access to the system.
The SUSE operating system must use the invoking user's password for privilege escalation when using "sudo".
The SUSE operating system must not be configured to allow blank or null passwords.
The SUSE operating system must disable the systemd Ctrl-Alt-Delete burst key sequence.
All SUSE operating system local interactive user home directories must be group-owned by the home directory owner's primary group.
The SUSE operating system must not allow unattended or automatic logon via the graphical user interface (GUI).
The SUSE operating system must not allow unattended or automatic logon via SSH.
The audit system must be configured to audit file deletions.
The operating system must ensure unauthorized, security-relevant configuration changes detected are tracked.
The audit system must be configured to audit all administrative, privileged, and security actions.
The audit system must be configured to audit failed attempts to access files and programs.
The auditing system must not define a different auditing level for specific users.
The System packages must be up to date with the most recent vendor updates and security fixes.
The finger daemon package must not be installed.
The legacy remote network access utilities daemons must not be installed.
The NIS package must not be installed.
The pidgin IM client package must not be installed.
The FTP daemon must not be installed unless required.
The TFTP service daemon must not be installed unless required.
The telnet service daemon must not be installed unless required.
The UUCP service daemon must not be installed unless required.
The rpcbind service must be configured for local only services unless organizationally defined.
The VNC server package must not be installed unless required.
All run control scripts must have mode 0755 or less permissive.
All run control scripts must have no extended ACLs.
Run control scripts executable search paths must contain only authorized paths.
Run control scripts library search paths must contain only authorized paths.
Run control scripts lists of preloaded libraries must contain only authorized paths.
Run control scripts must not execute world writable programs or scripts.
All system start-up files must be owned by root.
All system start-up files must be group-owned by root, sys, or bin.
System start-up files must only execute programs owned by a privileged UID or an application.
Any X Windows host must write .Xauthority files.
All .Xauthority files must have mode 0600 or less permissive.
The .Xauthority files must not have extended ACLs.
X displays must not be exported to the world.
.Xauthority or X*.hosts (or equivalent) file(s) must be used to restrict access to the X server.
The .Xauthority utility must only permit access to authorized hosts.
X Window System connections that are not required must be disabled.
The graphical login service provides the capability of logging into the system using an X-Windows type interface from the console. If graphical login access for the console is required, the service must be in local-only mode.
Generic Security Services (GSS) must be disabled.
Systems services that are not required must be disabled.
TCP Wrappers must be enabled and configured per site policy to only allow access by approved hosts and services.
The system must require passwords to contain no more than three consecutive repeating characters.
The system must not have accounts configured with blank or null passwords.
The delay between login prompts following a failed login attempt must be at least 4 seconds.
The system must prevent the use of dictionary words for passwords.
The default umask for system and users must be 077.
The default umask for FTP users must be 077.
The value mesg n must be configured as the default setting for all users.
Login services for serial ports must be disabled.
Access to a domain console via telnet must be restricted to the local host.
Access to a logical domain console must be restricted to authorized users.
The nobody access for RPC encryption key storage service must be disabled.
X11 forwarding for SSH must be disabled.
Consecutive login attempts for SSH must be limited to 3.
The rhost-based authentication for SSH must be disabled.
Direct root account login must not be permitted for SSH access.
Login must not be permitted with empty/null passwords for SSH.
Host-based authentication for login-based services must be disabled.
The use of FTP must be restricted.
The system must not allow autologin capabilities from the GNOME desktop.
Unauthorized use of the at or cron capabilities must not be permitted.
Logins to the root account must be restricted to the system console only.
The operating system must not allow logins for users with blank passwords.
The operating system must prevent remote devices that have established a non-remote connection with the system from communicating outside of the communication path with resources in external networks.
The system must disable directed broadcast packet forwarding.
The system must not respond to ICMP timestamp requests.
The system must not respond to ICMP broadcast timestamp requests.
The system must not respond to ICMP broadcast netmask requests.
The system must not respond to broadcast ICMP echo requests.
The system must not respond to multicast echo requests.
The system must ignore ICMP redirect messages.
The system must set strict multihoming.
The system must disable ICMP redirect messages.
The system must disable TCP reverse IP source routing.
The system must set maximum number of half-open TCP connections to 4096.
The system must set maximum number of incoming connections to 1024.
The system must disable network routing unless required.
The system must implement TCP Wrappers.
The boundary protection system (firewall) must be configured to deny network traffic by default and must allow network traffic by exception (i.e., deny all, permit by exception).
The system must prevent local applications from generating source-routed packets.
The operating system must prevent internal users from sending out packets which attempt to manipulate or spoof invalid IP addresses.
The operating system must use cryptographic mechanisms to protect and restrict access to information on portable digital media.
The sticky bit must be set on all world writable directories.
Permissions on user home directories must be 750 or less permissive.
Permissions on user . (hidden) files must be 750 or less permissive.
Permissions on user .netrc files must be 750 or less permissive.
There must be no user .rhosts files.
Groups assigned to users must exist in the /etc/group file.
Users must have a valid home directory assignment.
All user accounts must be configured to use a home directory that exists.
All home directories must be owned by the respective user assigned to it in /etc/passwd.
Duplicate Group IDs (GIDs) must not exist for multiple groups.
Reserved UIDs 0-99 must only be used by system accounts.
Duplicate user names must not exist.
Duplicate group names must not exist.
User .netrc files must not exist.
The system must not allow users to configure .forward files.
World-writable files must not exist.
All valid SUID/SGID files must be documented.
The operating system must have no unowned files.
The operating system must have no files with extended attributes.
The root account must be the only account with GID of 0.
The operator must document all file system objects that have non-standard access control list settings.
The operating system must be a supported release.
The system must implement non-executable program stacks.
Address Space Layout Randomization (ASLR) must be enabled.
Process core dumps must be disabled unless needed.
The system must be configured to store any process core dumps in a specific, centralized directory.
The centralized process core dump data directory must be owned by root.
The centralized process core dump data directory must be group-owned by root, bin, or sys.
The centralized process core dump data directory must have mode 0700 or less permissive.
Kernel core dumps must be disabled unless needed.
The kernel core dump data directory must be owned by root.
The kernel core dump data directory must be group-owned by root.
The kernel core dump data directory must have mode 0700 or less permissive.
The system must require passwords to change the boot device settings. (SPARC)
The operating system must implement transaction recovery for transaction-based systems.
SNMP communities, users, and passphrases must be changed from the default.
A file integrity baseline must be created, maintained, and reviewed at least weekly to determine if unauthorized changes have been made to important system files located in the root file system.
Direct logins must not be permitted to shared, default, application, or utility accounts.
The system must not have any unnecessary accounts.
The operating system must conduct backups of user-level information contained in the operating system per organization-defined frequency to conduct backups consistent with recovery time and recovery point objectives.
The operating system must conduct backups of system-level information contained in the information system per organization-defined frequency to conduct backups that are consistent with recovery time and recovery point objectives.
The operating system must conduct backups of operating system documentation including security-related documentation per organization-defined frequency to conduct backups that is consistent with recovery time and recovery point objectives.
The operating system must employ PKI solutions at workstations, servers, or mobile computing devices on the network to create, manage, distribute, use, store, and revoke digital certificates.
The operating system must employ malicious code protection mechanisms at workstations, servers, or mobile computing devices on the network to detect and eradicate malicious code transported by electronic mail, electronic mail attachments, web accesses, removable media, or other common means.
The operating system must have malicious code protection mechanisms at system entry and exit points to detect and eradicate malicious code transported by electronic mail, electronic mail attachments, web accesses, removable media, or other common means.
All manual editing of system-relevant files shall be done using the pfedit command, which logs changes made to the files.
The /etc/zones directory, and its contents, must have the vendor default owner, group, and permissions.
The limitpriv zone option must be set to the vendor default or less permissive.
The systems physical devices must not be assigned to non-global zones.
The audit system must identify in which zone an event occurred.
The audit system must maintain a central audit trail for all zones.
The operating system must monitor for unauthorized connections of mobile devices to organizational information systems.
The sshd server must bind the X11 forwarding server to the loopback address.
Splunk Enterprise must be configured to retain the identity of the original source host or device where the event occurred as part of the log record.
Splunk Enterprise must be configured with a report to notify the System Administrator (SA) and Information System Security Officer (ISSO), at a minimum, when an attack is detected on multiple devices and hosts within its scope of coverage.
Analysis, viewing, and indexing functions, services, and applications used as part of Splunk Enterprise must be configured to comply with DoD-trusted path and access requirements.
Samsung Android must have the DoD root and intermediate PKI certificates installed.
Samsung Android must be configured to not allow installation of applications with the following characteristics: - back up MD data to non-DoD cloud servers (including user and application access to cloud backup services);- transmit MD diagnostic data to non-DoD servers; - voice assistant application if available when MD is locked; - voice dialing application if available when MD is locked; - allows synchronization of data or applications between devices associated with user; and - allows unencrypted (or encrypted but not FIPS 140-2 validated) data sharing with other MDs or printers.
Samsung Android must allow only the Administrator (management tool) to perform the following management function: install/remove DoD root and intermediate PKI certificates.
Samsung Android must be configured to enable Common Criteria (CC) Mode.
Samsung Android's Work profile must have the DoD root and intermediate PKI certificates installed.
Samsung Android's Work profile must be configured to not allow installation of applications with the following characteristics: - back up MD data to non-DoD cloud servers (including user and application access to cloud backup services);- transmit MD diagnostic data to non-DoD servers; - voice assistant application if available when MD is locked; - voice dialing application if available when MD is locked; - allows synchronization of data or applications between devices associated with user; and - allows unencrypted (or encrypted but not FIPS 140-2 validated) data sharing with other MDs or printers.
Samsung Android's Work profile must allow only the Administrator (management tool) to perform the following management function: install/remove DoD root and intermediate PKI certificates.
Samsung Android's Work profile must be configured to enable Common Criteria (CC) Mode.
System BIOS or system controllers supporting password protection must have administrator accounts/passwords configured, and no others. (Intel)
The system must require authentication before allowing modification of the boot devices or menus. Secure the GRUB Menu (Intel).
The Samsung Android device must be configured to enable Certificate Revocation List (CRL) status checking.
The Samsung Android device must be configured to enforce that Wi-Fi Sharing is disabled.
The Samsung Android device work profile must be configured to enforce the system application disable list.
The Samsung Android device must be configured to disable the use of third-party keyboards.
The Samsung Android device must be provisioned as a fully managed device and configured to create a work profile.
The Samsung Android device work profile must be configured to disable automatic completion of work space internet browser text input.
The Samsung Android device work profile must be configured to disable the autofill services.
The VMM must enforce dual authorization for movement and/or deletion of all audit information, when such movement or deletion is not part of an authorized automatic process.
The VMM must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.
The ESXi host must verify the DCUI.Access list.
The ESXi host must verify the exception users list for lockdown mode.
The ESXi host Secure Shell (SSH) daemon must not allow host-based authentication.
The ESXi host Secure Shell (SSH) daemon must not allow authentication using an empty password.
The ESXi host Secure Shell (SSH) daemon must not permit user environment settings.
The ESXi host Secure Shell (SSH) daemon must perform strict mode checking of home directory configuration files.
The ESXi host Secure Shell (SSH) daemon must not allow compression or must only allow compression after successful authentication.
The ESXi host Secure Shell (SSH) daemon must be configured to not allow gateway ports.
The ESXi host Secure Shell (SSH) daemon must be configured to not allow X11 forwarding.
The ESXi host Secure Shell (SSH) daemon must not permit tunnels.
The ESXi host Secure Shell (SSH) daemon must set a timeout count on idle sessions.
The ESXi host Secure Shell (SSH) daemon must set a timeout interval on idle sessions.
Simple Network Management Protocol (SNMP) must be configured properly on the ESXi host.
The ESXi host must enable bidirectional Challenge-Handshake Authentication Protocol (CHAP) authentication for Internet Small Computer Systems Interface (iSCSI) traffic.
The ESXi host must disable Inter-Virtual Machine (VM) Transparent Page Sharing.
The ESXi host must configure the firewall to restrict access to services running on the host.
The ESXi host must configure the firewall to block network traffic by default.
The ESXi host must enable Bridge Protocol Data Units (BPDU) filter on the host to prevent being locked out of physical switch ports with Portfast and BPDU Guard enabled.
All port groups on standard switches must be configured to reject forged transmits.
All port groups on standard switches must be configured to reject guest Media Access Control (MAC) address changes.
All port groups on standard switches must be configured to reject guest promiscuous mode requests.
Use of the dvFilter network application programming interfaces (APIs) must be restricted.
All port groups on standard switches must be configured to a value other than that of the native virtual local area network (VLAN).
All port groups on standard switches must not be configured to virtual local area network (VLAN) 4095 unless Virtual Guest Tagging (VGT) is required.
All port groups on standard switches must not be configured to virtual local area network (VLAN) values reserved by upstream physical switches.
The ESXi host must not provide root/administrator-level access to Common Information Model (CIM)-based hardware monitoring tools or other third-party applications.
The ESXi host must have all security patches and updates installed.
The ESXi host must enable Secure Boot.
The ESXi host must use DOD-approved certificates.
The ESXi host must not suppress warnings that the local or remote shell sessions are enabled.
The ESXi host must not suppress warnings about unmitigated hyperthreading vulnerabilities.
The ESXi host Secure Shell (SSH) daemon must disable port forwarding.
The ESXi host OpenSLP service must be disabled.
The ESXi host must enable audit logging.
The ESXi host must enable strict x509 verification for SSL syslog endpoints.
The ESXi host must verify certificates for SSL syslog endpoints.
The ESXi host must enable volatile key destruction.
The ESXi host must configure a session timeout for the vSphere API.
The ESXi Host Client must be configured with a session timeout.
The ESXi host must be configured with an appropriate maximum password age.
The ESXi host must not be configured to override virtual machine (VM) configurations.
The ESXi host must not be configured to override virtual machine (VM) logger settings.
The ESXi host must require TPM-based configuration encryption.
The ESXi Common Information Model (CIM) service must be disabled.
VAMI must force clients to select the most secure cipher.
VAMI must disable client-initiated Transport Layer Security (TLS) renegotiation.
Performance Charts default servlet must be set to "readonly".
ESX Agent Manager default servlet must be set to "readonly".
The ESXi host DCUI.Access list must be verified.
The ESXi host lockdown mode exception users list must be verified.
The ESXi host must disable Simple Network Management Protocol (SNMP) v1 and v2c.
The ESXi host must configure virtual switch security policies to reject forged transmits.
The ESXi host must configure virtual switch security policies to reject Media Access Control (MAC) address changes.
The ESXi host must configure virtual switch security policies to reject promiscuous mode requests.
The ESXi host must restrict use of the dvFilter network application programming interface (API).
The ESXi host must restrict the use of Virtual Guest Tagging (VGT) on standard switches.
The ESXi host when using Host Profiles and/or Auto Deploy must use the vSphere Authentication Proxy to protect passwords when adding themselves to Active Directory.
The ESXi host must not use the default Active Directory ESX Admin group.
The ESXi host must enforce the exclusive running of executables from approved VIBs.
The ESXi host must use sufficient entropy for cryptographic operations.
The ESXi host must not enable log filtering.
The Photon operating system must use the "pam_cracklib" module.
The Photon operating system must set the "FAIL_DELAY" parameter.
The Photon operating system must enforce a delay of at least four seconds between logon prompts following a failed logon attempt.
The Photon operating system must ensure audit events are flushed to disk at proper intervals.
The Photon operating system must create a home directory for all new local interactive user accounts.
The Photon operating system must disable the debug-shell service.
The Photon operating system must configure sshd to disallow Generic Security Service Application Program Interface (GSSAPI) authentication.
The Photon operating system must configure sshd to disable environment processing.
The Photon operating system must configure sshd to disable X11 forwarding.
The Photon operating system must configure sshd to perform strict mode checking of home directory configuration files.
The Photon operating system must configure sshd to disallow Kerberos authentication.
The Photon operating system must configure sshd to disallow authentication with an empty password.
The Photon operating system must configure sshd to disallow compression of the encrypted session stream.
The Photon operating system must configure sshd to display the last login immediately after authentication.
The Photon operating system must configure sshd to ignore user-specific trusted hosts lists.
The Photon operating system must configure sshd to ignore user-specific "known_host" files.
The Photon operating system must configure sshd to limit the number of allowed login attempts per connection.
The Photon operating system must be configured so the x86 Ctrl-Alt-Delete key sequence is disabled on the command line.
The Photon operating system must be configured so the "/etc/skel" default scripts are protected from unauthorized modification.
The Photon operating system must be configured so the "/root" path is protected from unauthorized access.
The Photon operating system must be configured so that all global initialization scripts are protected from unauthorized modification.
The Photon operating system must be configured so that all system startup scripts are protected from unauthorized modification.
The Photon operating system must be configured so that all files have a valid owner and group owner.
The Photon operating system must be configured so the "/etc/cron.allow" file is protected from unauthorized modification.
The Photon operating system must be configured so that all cron jobs are protected from unauthorized modification.
The Photon operating system must be configured so that all cron paths are protected from unauthorized modification.
The Photon operating system must not forward IPv4 or IPv6 source-routed packets.
The Photon operating system must not respond to IPv4 Internet Control Message Protocol (ICMP) echoes sent to a broadcast address.
The Photon operating system must prevent IPv4 Internet Control Message Protocol (ICMP) redirect messages from being accepted.
The Photon operating system must prevent IPv4 Internet Control Message Protocol (ICMP) secure redirect messages from being accepted.
The Photon operating system must not send IPv4 Internet Control Message Protocol (ICMP) redirects.
The Photon operating system must log IPv4 packets with impossible addresses.
The Photon operating system must use a reverse-path filter for IPv4 network traffic.
The Photon operating system must not perform multicast packet forwarding.
The Photon operating system must not perform IPv4 packet forwarding.
The Photon operating system must send Transmission Control Protocol (TCP) timestamps.
The Photon operating system must be configured to protect the Secure Shell (SSH) public host key from unauthorized modification.
The Photon operating system must be configured to protect the Secure Shell ( SSH) private host key from unauthorized access.
The Photon operating system must enforce password complexity on the root account.
The Photon operating system must protect all boot configuration files from unauthorized modification.
The Photon operating system must protect sshd configuration from unauthorized access.
The Photon operating system must protect all "sysctl" configuration files from unauthorized access.
The Photon operating system must set the "umask" parameter correctly.
The Photon operating system must configure sshd to disallow HostbasedAuthentication.
The Photon operating system must configure sshd to restrict AllowTcpForwarding.
The Photon operating system must configure sshd to restrict LoginGraceTime.
The Photon operating system must disable systemd fallback Domain Name System (DNS).
The vCenter Server must disable the Customer Experience Improvement Program (CEIP).
The vCenter Server must disable the distributed virtual switch health check.
The vCenter Server must set the distributed port group Forged Transmits policy to "Reject".
The vCenter Server must set the distributed port group Media Access Control (MAC) Address Change policy to "Reject".
The vCenter Server must set the distributed port group Promiscuous Mode policy to "Reject".
The vCenter Server must only send NetFlow traffic to authorized collectors.
The vCenter Server must configure all port groups to a value other than that of the native virtual local area network (VLAN).
The vCenter Server must not configure VLAN Trunking unless Virtual Guest Tagging (VGT) is required and authorized.
The vCenter Server must not configure all port groups to virtual local area network (VLAN) values reserved by upstream physical switches.
The vCenter Server must configure the "vpxuser" auto-password to be changed every 30 days.
The vCenter Server must configure the "vpxuser" password to meet length policy.
The vCenter Server must be isolated from the public internet but must still allow for patch notification and delivery.
The vCenter Server must use unique service accounts when applications connect to vCenter.
The vCenter Server must protect the confidentiality and integrity of transmitted information by isolating Internet Protocol (IP)-based storage traffic.
The vCenter Server must disable or restrict the connectivity between vSAN Health Check and public Hardware Compatibility List (HCL) by use of an external proxy server.
The vCenter Server must configure the vSAN Datastore name to a unique name.
The vCenter Server must disable Username/Password and Windows Integrated Authentication.
The vCenter Server must restrict access to the default roles with cryptographic permissions.
The vCenter Server must restrict access to cryptographic permissions.
The vCenter Server must have Mutual Challenge Handshake Authentication Protocol (CHAP) configured for vSAN Internet Small Computer System Interface (iSCSI) targets.
The vCenter Server must have new Key Encryption Keys (KEKs) reissued at regular intervals for vSAN encrypted datastore(s).
The vCenter Server must use secure Lightweight Directory Access Protocol (LDAPS) when adding an LDAP identity source.
The vCenter Server must limit membership to the "SystemConfiguration.BashShellAdministrators" Single Sign-On (SSO) group.
The vCenter Server must limit membership to the "TrustedAdmins" Single Sign-On (SSO) group.
The vCenter server configuration must be backed up on a regular basis.
The vCenter server must have task and event retention set to at least 30 days.
The vCenter server Native Key Provider must be backed up with a strong password.
The vCenter server must require authentication for published content libraries.
The vCenter server must enable the OVF security policy for content libraries.
The vCenter Server must separate authentication and authorization for administrators.
The vCenter Server must disable CDP/LLDP on distributed switches.
The vCenter Server must remove unauthorized port mirroring sessions on distributed switches.
The vCenter Server must not override port group settings at the port level on distributed switches.
The vCenter Server must reset port configuration when virtual machines are disconnected.
The vCenter Server must disable Secure Shell (SSH) access.
The vCenter Server must enable data in transit encryption for vSAN.
The Security Token Service default servlet must be set to "readonly".
The vCenter Server must disable the distributed virtual switch health check.
The vCenter ESX Agent Manager service must enable STRICT_SERVLET_COMPLIANCE.
The vCenter ESX Agent Manager service must disable "ALLOW_BACKSLASH".
The vCenter ESX Agent Manager service must enable "ENFORCE_ENCODING_IN_GET_WRITER".
The vCenter Lookup service must enable "STRICT_SERVLET_COMPLIANCE".
The vCenter Lookup service must disable "ALLOW_BACKSLASH".
The vCenter Lookup service must enable "ENFORCE_ENCODING_IN_GET_WRITER".
The vSphere UI default servlet must be set to "readonly".
The vCenter Perfcharts service must enable "STRICT_SERVLET_COMPLIANCE".
The vCenter Perfcharts service must disable "ALLOW_BACKSLASH".
The vCenter Perfcharts service must enable "ENFORCE_ENCODING_IN_GET_WRITER".
The vCenter Server must be isolated from the public internet but must still allow for patch notification and delivery.
The vCenter Server must disable Username/Password and Windows Integrated Authentication.
The vCenter Server must use a limited privilege account when adding a Lightweight Directory Access Protocol (LDAP) identity source.
vCenter task and event retention must be set to at least 30 days.
vCenter Native Key Providers must be backed up with a strong password.
Copy operations must be disabled on the virtual machine (VM).
Drag and drop operations must be disabled on the virtual machine (VM).
Paste operations must be disabled on the virtual machine (VM).
Virtual disk shrinking must be disabled on the virtual machine (VM).
Virtual disk wiping must be disabled on the virtual machine (VM).
Independent, nonpersistent disks must not be used on the virtual machine (VM).
Host Guest File System (HGFS) file transfers must be disabled on the virtual machine (VM).
Unauthorized floppy devices must be disconnected on the virtual machine (VM).
Unauthorized CD/DVD devices must be disconnected on the virtual machine (VM).
Unauthorized parallel devices must be disconnected on the virtual machine (VM).
Unauthorized serial devices must be disconnected on the virtual machine (VM).
Unauthorized USB devices must be disconnected on the virtual machine (VM).
Console connection sharing must be limited on the virtual machine (VM).
Informational messages from the virtual machine to the VMX file must be limited on the virtual machine (VM).
Unauthorized removal, connection, and modification of devices must be prevented on the virtual machine (VM).
The virtual machine (VM) must not be able to obtain host information from the hypervisor.
Shared salt values must be disabled on the virtual machine (VM).
Access to virtual machines (VMs) through the "dvfilter" network Application Programming Interface (API) must be controlled.
System administrators must use templates to deploy virtual machines (VMs) whenever possible.
Use of the virtual machine (VM) console must be minimized.
The virtual machine (VM) guest operating system must be locked when the last console connection is closed.
All 3D features on the virtual machine (VM) must be disabled when not required.
Encryption must be enabled for vMotion on the virtual machine (VM).
Logging must be enabled on the virtual machine (VM).
Log size must be configured properly on the virtual machine (VM).
Log retention must be configured properly on the virtual machine (VM).
DirectPath I/O must be disabled on the virtual machine (VM) when not required.
Encryption must be enabled for Fault Tolerance on the virtual machine (VM).
The Photon operating system must prevent the use of dictionary words for passwords.
The Photon operating system must enforce a delay of at least four seconds between logon prompts following a failed logon attempt in login.defs.
The Photon operating system must define default permissions for all authenticated users in such a way that the user can only read and modify their own files.
The Photon operating system must configure Secure Shell (SSH) to disallow HostbasedAuthentication.
The Photon operating system must configure Secure Shell (SSH) to disallow authentication with an empty password.
The Photon operating system must configure Secure Shell (SSH) to disable user environment processing.
The Photon operating system must configure Secure Shell (SSH) to disallow Generic Security Service Application Program Interface (GSSAPI) authentication.
The Photon operating system must configure Secure Shell (SSH) to disable X11 forwarding.
The Photon operating system must configure Secure Shell (SSH) to perform strict mode checking of home directory configuration files.
The Photon operating system must configure Secure Shell (SSH) to disallow Kerberos authentication.
The Photon operating system must configure Secure Shell (SSH) to disallow compression of the encrypted session stream.
The Photon operating system must configure Secure Shell (SSH) to display the last login immediately after authentication.
The Photon operating system must configure Secure Shell (SSH) to ignore user-specific trusted hosts lists.
The Photon operating system must configure Secure Shell (SSH) to ignore user-specific known_host files.
The Photon operating system must configure Secure Shell (SSH) to limit the number of allowed login attempts per connection.
The Photon operating system must configure Secure Shell (SSH) to restrict AllowTcpForwarding.
The Photon operating system must configure Secure Shell (SSH) to restrict LoginGraceTime.
The Photon operating system must be configured so that the x86 Ctrl-Alt-Delete key sequence is disabled on the command line.
The Photon operating system must send TCP timestamps.
The Photon operating system must be configured to protect the Secure Shell (SSH) private host key from unauthorized access.
The Photon operating system must disable systemd fallback DNS.
The Photon operating system must generate audit records for all access and modifications to the opasswd file.
The Photon operating system must enable the rsyslog service.
The Photon operating system must enable hardlink access control protection in the kernel.
The Photon operating system must restrict core dumps.
The vCenter STS service must disable "ALLOW_BACKSLASH".
The vCenter STS service must enable "ENFORCE_ENCODING_IN_GET_WRITER".
The vCenter UI service must enable "STRICT_SERVLET_COMPLIANCE".
The vCenter UI service must disable "ALLOW_BACKSLASH".
The vCenter UI service must enable "ENFORCE_ENCODING_IN_GET_WRITER".
The vCenter VAMI service must enable honoring the SSL cipher order.
The vCenter VAMI service must disable client initiated TLS renegotiation.
The vCenter VAMI service must be configured to hide the server type and version in client responses.
The vCenter VAMI service must implement HTTP Strict Transport Security (HSTS).
The vCenter VAMI service must implement prevent rendering inside a frame or iframe on another site.
The vCenter VAMI service must protect against MIME sniffing.
The vCenter VAMI service must enable Content Security Policy.
Virtual machines (VMs) must have drag and drop operations disabled.
Virtual machines (VMs) must have paste operations disabled.
Virtual machines (VMs) must have virtual disk shrinking disabled.
Virtual machines (VMs) must have virtual disk wiping disabled.
Virtual machines (VMs) must limit console sharing.
Virtual machines (VMs) must limit informational messages from the virtual machine to the VMX file.
Virtual machines (VMs) must prevent unauthorized removal, connection, and modification of devices.
Virtual machines (VMs) must not be able to obtain host information from the hypervisor.
Virtual machines (VMs) must have shared salt values disabled.
Virtual machines (VMs) must disable access through the "dvfilter" network Application Programming Interface (API).
Virtual machines (VMs) must be configured to lock when the last console connection is closed.
Virtual machines (VMs) must disable 3D features when not required.
Virtual machines (VMs) must enable encryption for vMotion.
Virtual machines (VMs) must enable encryption for Fault Tolerance.
Virtual machines (VMs) must configure log size.
Virtual machines (VMs) must configure log retention.
Virtual machines (VMs) must enable logging.
Virtual machines (VMs) must not use independent, nonpersistent disks.
Virtual machines (VMs) must remove unneeded floppy devices.
Virtual machines (VMs) must remove unneeded CD/DVD devices.
Virtual machines (VMs) must remove unneeded parallel devices.
Virtual machines (VMs) must remove unneeded serial devices.
Virtual machines (VMs) must remove unneeded USB devices.
Virtual machines (VMs) must disable DirectPath I/O devices when not required.
The web server must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.
Zebra Android 11 must be configured to not allow passwords that include more than four repeating or sequential characters.
Zebra Android 11 must be configured to enforce an application installation policy by specifying one or more authorized application repositories, including [selection: DoD-approved commercial app repository, EMM server, mobile application store].
Zebra Android 11 must be configured to enforce an application installation policy by specifying an application allow list that restricts applications by the following characteristics: [selection: list of digital signatures, cryptographic hash values, names, application version].
Zebra Android 11 allow list must be configured to not include applications with the following characteristics:
- back up MD data to non-DoD cloud servers (including user and application access to cloud backup services);
- transmit MD diagnostic data to non-DoD servers;
- voice assistant application if available when MD is locked;
- voice dialing application if available when MD is locked;
- allows synchronization of data or applications between devices associated with user; and
- allows unencrypted (or encrypted but not FIPS 140-2 validated) data sharing with other MDs or printers.
Zebra Android 11 must be configured to disable Bluetooth or configured via User Based Enforcement (UBE) to allow Bluetooth for only Headset Profile (HSP), HandsFree Profile (HFP), and Serial Port Profile (SPP).
Zebra Android 11 must be configured to not display the following (work profile) notifications when the device is locked: [selection:
- email notifications
- calendar appointments
- contact associated with phone call notification
- text message notification
- other application-based notifications
- all notifications].
Zebra Android 11 must be configured to disable trust agents.
Zebra Android 11 must be configured to disable multi-user modes.
Zebra Android 11 must allow only the Administrator (EMM) to perform the following management function: Enable/disable location services.
Zebra Android 11 must be configured to enable audit logging.
Zebra Android 11 users must complete required training.
Zebra Android 11 must be configured to enforce that Wi-Fi Sharing is disabled.
Zebra Android 11 must have the DoD root and intermediate PKI certificates installed.
Zebra Android 11 must allow only the administrator (EMM) to install/remove DoD root and intermediate PKI certificates.
Zebra Android 11 work profile must be configured to enforce the system application disable list.
Zebra Android 11 work profile must be configured to disable automatic completion of work space internet browser text input.
Zebra Android 11 Work Profile must be configured to disable the autofill services.
Zebra Android 11 must be configured to disallow configuration of date and time.
Zebra Android 11 devices must have the latest available Zebra Android 11 operating system installed.
Zebra Android 11 devices must be configured to disable the use of third-party keyboards.
Zebra Android 11 devices must be configured to enable Common Criteria Mode (CC Mode).
CICS System Initialization Table (SIT) parameter values must be specified in accordance with proper security requirements.
CICS startup JCL statement is not specified in accordance with the proper security requirements.
Key ACF2/CICS parameters must be properly coded.
Sensitive CICS transactions are not protected in accordance with the proper security requirements.
Production WebSphere MQ Remotes must utilize Certified Name Filters (CNF).
The Windows DNS Server must be configured to record who added/modified/deleted DNS zone information.
The Windows DNS Server must notify the DNS administrator in the event of an error validating another DNS server's identity.
The "Manage auditing and security log" user right must be assigned only to authorized personnel.
The Windows DNS Server must prohibit recursion on authoritative name servers for which forwarders have not been configured for external queries.
Forwarders on an authoritative Windows DNS Server, if enabled for external resolution, must forward only to an internal, non-Active Directory (AD)-integrated DNS server or to the DOD Enterprise Recursive Services (ERS).
The Windows DNS Server with a caching name server role must restrict recursive query responses to only the IP addresses and IP address ranges of known supported clients.
The EDB Postgres Advanced Server password file must not be used.
The EDB Postgres Advanced Server must be configured in accordance with the security configuration settings based on DoD security configuration and implementation guidance, including STIGs, NSA configuration guides, CTOs, DTMs, and IAVMs.
The Windows DNS Server's zone files must have NS records that point to active name servers authoritative for the domain specified in that record.
The Windows DNS Server must be configured to enable DNSSEC Resource Records (RRs).
The digital signature algorithm used for DNSSEC-enabled zones must be FIPS-compatible.
In a split DNS configuration between the external and internal networks, the external name server must be configured to not be reachable from inside resolvers.
The Windows DNS Servers zone database files must not be accessible for edit/write by users and/or processes other than the Windows DNS Server service account and/or the DNS database administrator.
The Windows DNS Server must implement internal/external role separation.
The Windows DNS Server authoritative for local zones must only point root hints to the DNS servers that host the internal root domain.
The Windows DNS Servers zone files must not include resource records that resolve to a fully qualified domain name residing in another zone.
The Windows DNS Server's zone files must not include CNAME records pointing to a zone with lesser security for more than six months.
Nonroutable IPv6 link-local scope addresses must not be configured in any zone.
AAAA addresses must not be configured in a zone for hosts that are not IPv6 aware.
The Windows DNS Server must provide its identity with returned DNS information by enabling DNSSEC and TSIG/SIG(0).
The salt value for zones signed using NSEC3 resource records (RRs) must be changed every time the zone is completely re-signed.
The Windows DNS Server's IP address must be statically defined and configured locally on the server.
The Windows DNS Server must return data information in response to internal name/address resolution queries.
The Windows DNS Server must use DNSSEC data within queries to confirm data origin to DNS resolvers.
The Windows DNS Server must follow procedures to re-role a secondary name server as the primary name server if the primary name server permanently loses functionality.
The Windows DNS Server must, when a component failure is detected, activate a notification to the system administrator.
The private keys corresponding to both the zone signing key (ZSK) and the key signing key (KSK) must not be kept on the DNSSEC-aware primary authoritative name server when the name server does not support dynamic updates.
Control options for the Top Secret CICS facilities must meet minimum requirements.
The BIG-IP APM module access policy profile must be configured to display an explicit logoff message to users, indicating the reliable termination of authenticated communications sessions when disconnecting from virtual servers.
The BIG-IP appliance must be configured to enforce organization-defined role-based access control policies over defined subjects and objects.
The BIG-IP appliance must be configured to synchronize internal information system clocks with the primary and secondary time sources located in different geographic regions using redundant authoritative time sources.
The BIG-IP appliance must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.
The BIG-IP appliance must be configured to employ automated mechanisms to centrally manage authentication settings.
The BIG-IP appliance must create backups of system-level information contained in the information system when changes occur or weekly, whichever is sooner.
The BIG-IP appliance must be configured to create backups of information system documentation, including security-related documentation, when changes occur or weekly, whichever is sooner.
The BIG-IP appliance must be configured to obtain its public key certificates from an appropriate certificate policy through a DoD-approved service provider.
The F5 BIG-IP must ensure SSH is disabled for root user logon to prevent remote access using the root account.
The BIG-IP appliance must provide automated support for account management functions.
The BIG-IP appliance must automatically remove or disable temporary user accounts after 72 hours.
The BIG-IP appliance must automatically disable accounts after a 35-day period of account inactivity.
Upon successful logon, the BIG-IP appliance must be configured to notify the administrator of the date and time of the last logon.
Upon successful logon, the BIG-IP appliance must be configured to notify the administrator of the number of unsuccessful logon attempts since the last successful logon.
The BIG-IP appliance must be configured to alert the ISSO and SA (at a minimum) in the event of an audit processing failure.
The BIG-IP appliance must be configured to protect audit information from any type of unauthorized read access.
The BIG-IP appliance must be configured to use NIAP evaluated cryptographic mechanisms to protect the integrity of audit information at rest.
The BIG-IP appliance must be configured to uniquely identify and authenticate organizational administrators (or processes acting on behalf of organizational administrators).
The BIG-IP appliance must be configured to prohibit password reuse for a minimum of five generations.
The BIG-IP appliance must be configured to enforce 24 hours/1 day as the minimum password lifetime.
The BIG-IP appliance must be configured to enforce a 60-day maximum password lifetime restriction.
The BIG-IP appliance must be configured to automatically remove or disable emergency accounts after 72 hours.
The application must be configured to reveal error messages only to authorized individuals (ISSO, ISSM, and SA).
The BIG-IP appliance must be configured to activate a system alert message, send an alarm, and/or automatically shut down when a component failure is detected.
The BIG-IP appliance must be configured to generate alerts that can be forwarded to the administrators and Information System Security Officer (ISSO) when accounts are created.
The BIG-IP appliance must be configured to generate alerts that can be forwarded to the administrators and Information System Security Officer (ISSO) when accounts are modified.
The BIG-IP appliance must be configured to generate alerts that can be forwarded to the administrators and Information System Security Officer (ISSO) when accounts are disabled.
The BIG-IP appliance must be configured to generate alerts that can be forwarded to the administrators and Information System Security Officer (ISSO) when accounts are removed.
The BIG-IP appliance must be configured to generate an immediate alert for account-enabling actions.
The BIG-IP appliance must be configured to transmit access authorization information using approved security safeguards to authorized information systems that enforce access control decisions.
The BIG-IP appliance must be configured to automatically lock the account until the locked account is released by an administrator when three unsuccessful logon attempts in 15 minutes are exceeded.
The BIG-IP appliance must be configured to notify the administrator, upon successful logon (access), of the location of last logon (terminal or IP address) in addition to the date and time of the last logon (access).
The BIG-IP appliance must be configured to generate an immediate alert when allocated audit record storage volume reaches 75% of repository maximum audit record storage capacity.
The BIG-IP appliance must be configured to implement automated security responses if baseline configurations are changed in an unauthorized manner.
The BIG-IP appliance must be configured to dynamically manage user accounts.
The BIG-IP appliance must be configured to allow the use of a temporary password for system logons with an immediate change to a permanent password.
The BIG-IP appliance must be configured to notify the administrator of the number of successful logon attempts occurring during an organization-defined time period.
The BIG-IP appliance must be configured to use automated mechanisms to alert security personnel to threats identified by authoritative sources (e.g., CTOs) and IAW with CJCSM 6510.01B.
The BIG-IP appliance must be configured to employ automated mechanisms to centrally apply authentication settings.
The BIG-IP appliance must be configured to employ automated mechanisms to centrally verify authentication settings.
The BIG-IP appliance must be configured to employ automated mechanisms to assist in the tracking of security incidents.
The BIG-IP Core implementation must be configured to inspect for protocol compliance and protocol anomalies in inbound SMTP and Extended SMTP communications traffic to virtual servers.
The BIG-IP Core implementation must be configured to inspect for protocol compliance and protocol anomalies in inbound FTP and FTPS communications traffic to virtual servers.
The BIG-IP Core implementation must be configured to inspect for protocol compliance and protocol anomalies in inbound HTTP and HTTPS traffic to virtual servers.
The BIG-IP Core implementation must automatically terminate a user session for a user connected to virtual servers when organization-defined conditions or trigger events occur that require a session disconnect.
The BIG-IP Core must display an explicit logoff message to users indicating the reliable termination of authenticated communications sessions when providing access to virtual servers.
Uninstall 389-ds-base Package
NetworkManager DNS Mode Must Be Must Configured
Verify Group Who Owns cron.deny
Verify Owner on cron.deny
The EMM system supporting the iOS/iPadOS 17 BYOAD must be configured for autonomous monitoring, compliance, and validation to ensure security/configuration settings of mobile devices do not deviate from the approved configuration baseline.
The EMM system supporting the iOS/iPadOS 17 BYOAD must be configured to initiate autonomous monitoring, compliance, and validation prior to granting the BYOAD access to DOD information and IT resources.
The EMM system supporting the iOS/iPadOS 17 BYOAD must be configured to detect if the BYOAD native security controls are disabled.
The EMM system supporting the iOS/iPadOS 17 BYOAD must be configured to detect if known malicious, blocked, or prohibited applications are installed on the BYOAD (DOD-managed segment only).
The EMM system supporting the iOS/iPadOS 17 BYOAD must be configured to detect if the BYOAD is configured to access nonapproved third-party applications stores (DOD-managed segment only).
The EMM detection/monitoring system must use continuous monitoring of enrolled iOS/iPadOS 17 BYOAD.
The iOS/iPadOS 17 BYOAD must be configured to either disable access to DOD data, IT systems, and user accounts or wipe managed data and apps if the EMM system detects native security controls are disabled.
The iOS/iPadOS 17 BYOAD must be configured to either disable access to DOD data, IT systems, and user accounts or wipe managed data and apps if the EMM system detects the BYOAD device has known malicious, blocked, or prohibited applications or is configured to access nonapproved managed third-party applications stores.
The iOS/iPadOS 17 BYOAD must be configured so that managed data and apps are removed if the device is no longer receiving security or software updates.
The iOS/iPadOS 17 BYOAD must be configured to protect users' privacy, personal information, and applications.
The EMM system supporting the iOS/iPadOS 17 BYOAD must be configured to only wipe managed data and apps and not unmanaged data and apps when the user's access is revoked or terminated, the user no longer has the need to access DOD data or IT, or the user reports a registered device as lost, stolen, or showing indicators of compromise.
The EMM system supporting the iOS/iPadOS 17 BYOAD must be NIAP validated (included on the NIAP list of compliant products or products in evaluation) unless the DOD CIO has granted an approved Exception to Policy (E2P).
Apple iOS/iPadOS 17 allow list must be configured to not include applications with the following characteristics:
- backs up MD data to non-DOD cloud servers (including user and application access to cloud backup services);
- transmits MD diagnostic data to non-DOD servers;
- allows synchronization of data or applications between devices associated with user; and
- allows unencrypted (or encrypted but not FIPS 140-2/FIPS 140-3 validated) data sharing with other MDs or printers.
Apple iOS/iPadOS 17 must be configured to [selection: remove Enterprise applications, remove all noncore applications (any nonfactory installed application)] upon unenrollment from MDM.
Apple iOS/iPadOS 17 must allow the Administrator (MDM) to perform the following management function: enable/disable VPN protection across the device and [selection: other methods].
Apple iOS/iPadOS 17 must be configured to enforce a passcode reuse prohibition of at least two generations.
The macOS system must disable unattended or automatic login to the system.
The macOS system must secure users' home folders.
The macOS system must enable macOS Application Firewall.
The macOS system must enforce enrollment in Mobile Device Management (MDM).
The macOS system must enable Recovery Lock.
The application must allow the use of a temporary password for system logons with an immediate change to a permanent password.
Ubuntu 22.04 LTS must disable the x86 Ctrl-Alt-Delete key sequence.
Ubuntu 22.04 LTS must have the "libpam-pwquality" package installed.
Ubuntu 22.04 LTS must have the "chrony" package installed.
Ubuntu 22.04 LTS must not have the "systemd-timesyncd" package installed.
Ubuntu 22.04 LTS must not have the "ntp" package installed.
Ubuntu 22.04 LTS must have an application firewall enabled.
Ubuntu 22.04 LTS must not allow unattended or automatic login via SSH.
Ubuntu 22.04 LTS must be configured so that remote X connections are disabled, unless to fulfill documented and validated mission requirements.
Ubuntu 22.04 LTS SSH daemon must prevent remote hosts from connecting to the proxy display.
Ubuntu 22.04 LTS must disable the x86 Ctrl-Alt-Delete key sequence if a graphical user interface is installed.
Ubuntu 22.04 LTS must enforce a delay of at least four seconds between logon prompts following a failed logon attempt.
Ubuntu 22.04 LTS must display the date and time of the last successful account logon upon logon.
Ubuntu 22.04 LTS default filesystem permissions must be defined in such a way that all authenticated users can read and modify only their own files.
Ubuntu 22.04 LTS must prevent the use of dictionary words for passwords.
Ubuntu 22.04 LTS must be configured so that when passwords are changed or new passwords are established, pwquality must be used.
Ubuntu 22.04 LTS must not allow accounts configured with blank or null passwords.
Ubuntu 22.04 LTS must not have accounts configured with blank or null passwords.
Ubuntu 22.04 LTS must generate audit records for all events that affect the systemd journal files.
The Cisco ISE must conduct configuration and operational backups when changes are made or must schedule backups weekly, at a minimum.
The Mission owner must obtain Authorizing Official (AO) authorization for each cloud service offering (CSO) implemented in support of production or development environments prior to operational use.
The Mission Owner must select and configure an Impact Level 2 FedRAMP authorized cloud service offering (CSO) when hosting unclassified, publicly releasable DOD information.
The Mission Owner must select and configure an Impact Level 4/5 cloud service offering (CSO) listed in the DISA Provisional Authorization (PA) DOD Cloud Catalog when hosting Controlled Unclassified Information (CUI).
The Mission Owner must select and configure an Impact Level 5 cloud service offering (CSO) listed in the DISA Provisional Authorization (PA) DOD Cloud Catalog when hosting Unclassified National Security Information (U-NSI).
The Mission Owners must select and configure a cloud service offering (CSO) listed in the DISA Provisional Authorization (PA) DOD Cloud Catalog at Level 6 when hosting classified DOD information.
The Mission Owner must add all applicable compensating controls and requirements in the Service Level Agreement (SLA)/contract with the cloud service provider (CSP) or third-party provider.
The Enterprise Voice, Video, and Messaging Endpoint must be configured to apply 802.1Q VLAN tags to signaling and media traffic.
The Enterprise Voice, Video, and Messaging Endpoint must notify the user, upon successful logon (access) to the network element, of the date and time of the last logon (access).
The Enterprise Voice, Video, and Messaging Endpoint must notify the user, upon successful logon (access), of the number of unsuccessful logon (access) attempts since the last successful logon (access).
The Enterprise Voice, Video, and Messaging Endpoint must provide an explicit indication of current participants in all Videoconference (VC)-based and IP-based online meetings and conferences.
The Enterprise Voice, Video, and Messaging Endpoint must be configured in accordance with the security configuration settings based on DOD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.
The Enterprise Voice, Video, and Messaging Endpoint must be configured with a firmware release supported by the vendor.
The Enterprise Voice, Video, and Messaging Endpoint must be configured to dynamically implement configuration file changes.
The Enterprise Voice, Video, and Messaging Endpoint must be configured to disable any auto answer features.
The F5 BIG-IP appliance that provides intermediary services for SMTP must inspect inbound and outbound SMTP and Extended SMTP communications traffic for protocol compliance and protocol anomalies.
The F5 BIG-IP appliance that intermediary services for FTP must inspect inbound and outbound FTP communications traffic for protocol compliance and protocol anomalies.
The F5 BIG-IP appliance that provides intermediary services for HTTP must inspect inbound and outbound HTTP traffic for protocol compliance and protocol anomalies.
The F5 BIG-IP must be configured to identify and authenticate all endpoint devices or peers before establishing a connection.
The F5 BIG-IP appliance providing remote access intermediary services must disable split-tunneling for remote clients' VPNs.
The F5 BIG-IP appliance providing remote access intermediary services must be configured to route sessions to an IDPS for inspection.
The VPN Gateway must use Always On VPN connections for remote computing.
The F5 BIG-IP DNS implementation must prohibit recursion on authoritative name servers.
The validity period for the RRSIGs covering a zone's DNSKEY RRSet must be no less than two days and no more than one week.
The F5 BIG-IP DNS must use valid root name servers in the local root zone file.
The digital signature algorithm used for DNSSEC-enabled zones must be set to use RSA/SHA256 or RSA/SHA512.
The F5 BIG-IP DNS server implementation must validate the binding of the other DNS server's identity to the DNS information for a server-to-server transaction (e.g., zone transfer).
The Enterprise Voice, Video, and Messaging Session Manager supporting Command and Control (C2) communications must associate multilevel precedence and preemption (MLPP) attributes when exchanged between unified capabilities (UC) systems.
The Enterprise Voice, Video, and Messaging Session Manager supporting Command and Control (C2) communications must validate the integrity of transmitted multilevel precedence and preemption (MLPP) attributes.
The Enterprise Voice, Video, and Messaging Session Manager must be configured to enforce changes to privileges of Voice Video Endpoint user access.
The Enterprise Voice, Video, and Messaging Session Manager must be configured to enforce changes to privileges of Voice Video Endpoint device access.
The Enterprise Voice, Video, and Messaging Session Manager must be configured to provide an indication of current participants in all calls, meetings, and conferences.
The Enterprise Voice, Video, and Messaging Session Manager supporting Command and Control (C2) communications must associate multilevel precedence and preemption (MLPP) attributes when exchanged between unified capabilities (UC) system components.
The Enterprise Voice, Video, and Messaging Session Manager must be configured to limit and reserve bandwidth based on priority of the traffic type.
The Enterprise Voice, Video, and Messaging Session Manager must be configured to use the organization authoritative time source (NTP) to maintain system time.
The Enterprise Voice, Video, and Messaging Session Manager must be configured in accordance with the security configuration settings based on DOD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.
The F5 BIG-IP appliance must be configured to use TCP when sending log records to the central audit server.
The F5 BIG-IP appliance must be configured to restrict itself from accepting outbound packets that contain an illegitimate address in the source address field via an egress filter or by enabling Unicast Reverse Path Forwarding (uRPF).
The F5 BIG-IP appliance must employ filters that prevent or limit the effects of all types of commonly known denial-of-service (DoS) attacks, including flooding, packet sweeps, and unauthorized port scanning.
The F5 BIG-IP appliance must be configured to inspect all inbound and outbound traffic at the application layer.
The F5 BIG-IP appliance must be configured to assign appropriate user roles or access levels to authenticated users.
The F5 BIG-IP appliance must be configured to audit the execution of privileged functions such as accounts additions and changes.
The F5 BIG-IP appliance must be configured to synchronize internal information system clocks using redundant authoritative time sources.
The F5 BIG-IP appliance must be configured to use at least two authentication servers to authenticate administrative users.
The F5 BIG-IP appliance must be running an operating system release that is currently supported by the vendor.
The F5 BIG-IP appliance must obtain its public key certificates from an appropriate certificate policy through an approved service provider.
The F5 BIG-IP appliance must conduct backups of the configuration at a weekly or organization-defined frequency and store on a separate device.
The F5 BIG-IP appliance IPsec VPN Gateway must use Internet Key Exchange (IKE) for IPsec VPN Security Associations (SAs).
The Enterprise Voice, Video, and Messaging Session Manager must be configured to apply 802.1Q VLAN tags to signaling and media traffic.
The Enterprise Voice, Video, and Messaging Session Manager must be configured to use a voice or video VLAN, separate from all other VLANs.
Google Android 14 must be configured to enforce an application installation policy by specifying one or more authorized application repositories.
Google Android 14 allowlist must be configured to not include applications with the following characteristics (work profile only):
1. Back up mobile device (MD) data to non-DOD cloud servers (including user and application access to cloud backup services);
2. Transmit MD diagnostic data to non-DOD servers;
3. Voice assistant application if available when MD is locked;
4. Voice dialing application if available when MD is locked;
5. Allows synchronization of data or applications between devices associated with user; and
6. Allows unencrypted (or encrypted but not FIPS 140-3 validated) data sharing with other MDs or printers.
7. Apps which backup their own data to a remote system.
Google Android 14 must have the DOD root and intermediate PKI certificates installed (work profile only).
The Google Android 14 work profile must be configured to enforce the system application disable list (work profile only).
Google Android 14 must be provisioned as a BYOAD device (Android work profile for employee-owned devices [BYOD]).
Android 14 devices must have the latest available Google Android 14 operating system installed.
Android 14 devices must be configured to disable the use of third-party keyboards (work profile only).
The Google Android 14 must allow only the administrator (EMM) to install/remove DOD root and intermediate PKI certificates (work profile).
The EMM system supporting the Google Android 14 BYOAD must be configured for autonomous monitoring, compliance, and validation to ensure security/configuration settings of mobile devices do not deviate from the approved configuration baseline.
The EMM system supporting the Google Android 14 BYOAD must be configured to initiate autonomous monitoring, compliance, and validation prior to granting the Google Android 14 BYOAD access to DOD information and IT resources.
The EMM system supporting the Google Android 14 BYOAD must be configured to detect if the Google Android 14 BYOAD native security controls are disabled.
The EMM system supporting the Google Android 14 BYOAD must be configured to detect if known malicious applications, blocked, or prohibited applications are installed on the Google Android 14 BYOAD (DOD-managed segment only).
The EMM detection/monitoring system must use continuous monitoring of enrolled Google Android 14 BYOAD.
The Google Android 14 BYOAD must be configured to either disable access to DOD data and IT systems and user accounts or wipe the work profile if the EMM system detects that native security controls are disabled.
The Google Android 14 BYOAD must be configured to either disable access to DOD data and IT systems and user accounts or wipe the work profile if the EMM system detects the Google Android 14 BYOAD device has known malicious, blocked, or prohibited applications, or configured to access nonapproved third-party applications stores in the work profile.
The Google Android 14 BYOAD must be configured so that the work profile is removed if the device is no longer receiving security or software updates.
The EMM system supporting the Google Android 14 BYOAD must be NIAP validated (included on the NIAP list of compliant products or products in evaluation) unless the DOD CIO has granted an Approved Exception to Policy (E2P).
The User Agreement must include a description of what personal data and information is being monitored, collected, or managed by the EMM system or deployed agents or tools.
The mobile device used for BYOAD must be NIAP validated.
Google Android 15 must be configured to enforce an application installation policy by specifying one or more authorized application repositories, including [selection: DOD-approved commercial app repository, MDM server, mobile application store].
Google Android 15 users must complete required training.
Google Android 15 must be configured to disable Wi-Fi Sharing.
Google Android 15 must be configured to enforce a password for Wi-Fi and Bluetooth hotspot, if approved for use by the approving authority (AO). If not approved for use, Wi-Fi and Bluetooth hotspot must be disabled.
Google Android 15 must have the DOD root and intermediate PKI certificates installed.
The Google Android 15 work profile must be configured to enforce the system application disable list.
The Google Android 15 work profile must be configured to disable automatic completion of workspace internet browser text input.
The Google Android 15 work profile must be configured to disable the autofill services.
Google Android 15 must be configured to disallow configuration of date and time.
Android 15 devices must have the latest available Google Android 15 operating system installed.
Android 15 devices must be configured to disable the use of third-party keyboards.
Android 15 devices must be configured to enable Common Criteria Mode (CC Mode).
Google Android 15 must be configured to enforce a password for Wi-Fi and Bluetooth hotspot, if approved for use by the authorizing official (AO). If not approved for use, Wi-Fi and Bluetooth hotspot must be disabled.
The Google Android 15 work profile must be configured to prevent users from adding personal email accounts to the work email app.
Google Android 15 must be provisioned as a fully managed device and configured to create a work profile.
Android 15 devices must be configured to enable Common Criteria (CC) Mode.
Unauthorized partitions must not exist on the system complex.
The Hardware Management Console must be located in a secure location.
The manufacturer’s default passwords must be changed for all Hardware Management Console (HMC) Management software.
Connection to the Internet for IBM remote support must be in compliance with the Remote Access STIGs.
Connection to the Internet for IBM remote support must be in compliance with mitigations specified in the Ports and Protocols and Services Management (PPSM) requirements.
XFACILIT class, or alternate class if specified in module CKRSITE, must be active.
The ISEC7 SPHERE must be configured to leverage the enterprise directory service accounts and groups for ISEC7 SPHERE server admin identification and authentication.
The ISEC7 SPHERE must configure the timeout for the console to be 15 minutes or less.
The ISEC7 SPHERE, Tomcat installation, and ISEC7 Suite monitor must be configured to use the Windows Trust Store for the storage of digital certificates and keys.
The Ivanti EPMM server must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.
Sentry must be configured to synchronize internal information system clocks using redundant authoritative time sources.
Sentry must enforce access restrictions associated with changes to the system components.
Sentry must be configured to conduct backups of system level information contained in the information system when changes occur.
Sentry must obtain its public key certificates from an appropriate certificate policy through an approved service provider.
Sentry must be running an operating system release that is currently supported by MobileIron.
The Juniper SRX Services Gateway must use DOD-approved PKI rather than proprietary or self-signed device certificates.
The Juniper SRX Services Gateway must allow only the information system security manager (ISSM) (or administrators/roles appointed by the ISSM) to select which auditable events are to be generated and forwarded to the syslog and/or local logs.
Only required ports must be open on containers in MKE.
Vulnerability scanning must be enabled for all repositories in MSR.
MongoDB must be configured in accordance with the security configuration settings based on DOD security configuration and implementation guidance, including STIGs, NSA configuration guides, CTOs, DTMs, and IAVMs.
Windows 10 must employ automated mechanisms to determine the state of system components with regard to flaw remediation using the following frequency: Continuously, where ESS is used; 30 days, for any additional internal network scans not covered by ESS; and annually, for external scans by Computer Network Defense Service Provider (CNDSP).
Windows 11 must employ automated mechanisms to determine the state of system components with regard to flaw remediation using the following frequency: Continuously, where ESS is used; 30 days, for any additional internal network scans not covered by ESS; and annually, for external scans by Computer Network Defense Service Provider (CNDSP).
The built-in Microsoft password complexity filter must be enabled.
Virtualization Based Security must be enabled on Windows 10 with the platform security level configured to Secure Boot or Secure Boot with DMA Protection.
Windows 10 systems must use either Group Policy or an approved Mobile Device Management (MDM) product to enforce STIG compliance.
Windows 11 systems must use either Group Policy or an approved Mobile Device Management (MDM) product to enforce STIG compliance.
Windows Server 2019 Active Directory user accounts, including administrators, must be configured to require the use of a Common Access Card (CAC), Personal Identity Verification (PIV)-compliant hardware token, or Alternate Logon Token (ALT) for user authentication.
Windows Server 2019 Kerberos user logon restrictions must be enforced.
Windows Server 2019 must employ automated mechanisms to determine the state of system components with regard to flaw remediation using the following frequency: continuously, where Endpoint Security Solution (ESS) is used; 30 days, for any additional internal network scans not covered by ESS; and annually, for external scans by Computer Network Defense Service Provider (CNDSP).
AAAA addresses must not be configured in a zone for hosts that are not dual stack.
Windows Server 2022 must employ automated mechanisms to determine the state of system components with regard to flaw remediation using the following frequency: continuously, where Endpoint Security Solution (ESS) is used; 30 days, for any additional internal network scans not covered by ESS; and annually, for external scans by Computer Network Defense Service Provider (CNDSP).
RHEL 9 must configure a DNS processing mode in Network Manager.
SLEM 5 must disable the x86 Ctrl-Alt-Delete key sequence.
SLEM 5 kernel core dumps must be disabled unless needed.
Vendor-packaged SLEM 5 security patches and updates must be installed and up to date.
A separate file system must be used for SLEM 5 user home directories (such as /home or an equivalent).
SLEM 5 must use a separate file system for /var.
SLEM 5 must use a separate file system for the system audit data path.
SLEM 5 file systems that are being imported via Network File System (NFS) must be mounted to prevent files with the setuid and setgid bit set from being executed.
SLEM 5 file systems that are being imported via Network File System (NFS) must be mounted to prevent binary files from being executed.
SLEM 5 file systems that are used with removable media must be mounted to prevent files with the setuid and setgid bit set from being executed.
SLEM 5 file systems that contain user home directories must be mounted to prevent files with the setuid and setgid bit set from being executed.
All SLEM 5 local interactive user home directories must have mode 750 or less permissive.
All SLEM 5 local initialization files must have mode 740 or less permissive.
SLEM 5 SSH daemon public host key files must have mode 644 or less permissive.
SLEM 5 SSH daemon private host key files must have mode 640 or less permissive.
All SLEM 5 files and directories must have a valid owner.
All SLEM 5 files and directories must have a valid group owner.
All SLEM 5 local interactive user home directories must be group-owned by the home directory owner's primary group.
All SLEM 5 world-writable directories must be group-owned by root, sys, bin, or an application group.
SLEM 5 must be configured to prohibit or restrict the use of functions, ports, protocols, and/or services as defined in the Ports, Protocols, and Services Management (PPSM) Category Assignments List (CAL) and vulnerability assessments.
SLEM 5 must not have network interfaces in promiscuous mode unless approved and documented.
SLEM 5 must not forward Internet Protocol version 4 (IPv4) source-routed packets.
SLEM 5 must not forward Internet Protocol version 4 (IPv4) source-routed packets by default.
SLEM 5 must prevent Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirect messages from being accepted.
SLEM 5 must not allow interfaces to accept Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirect messages by default.
SLEM 5 must not send Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirects.
SLEM 5 must not allow interfaces to send Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirect messages by default.
SLEM 5 must not be performing Internet Protocol version 4 (IPv4) packet forwarding unless the system is a router.
SLEM 5 must not forward Internet Protocol version 6 (IPv6) source-routed packets.
SLEM 5 must not forward Internet Protocol version 6 (IPv6) source-routed packets by default.
SLEM 5 must prevent Internet Protocol version 6 (IPv6) Internet Control Message Protocol (ICMP) redirect messages from being accepted.
SLEM 5 must not allow interfaces to accept Internet Protocol version 6 (IPv6) Internet Control Message Protocol (ICMP) redirect messages by default.
SLEM 5 must not be performing Internet Protocol version 6 (IPv6) packet forwarding unless the system is a router.
SLEM 5 must not be performing Internet Protocol version 6 (IPv6) packet forwarding by default unless the system is a router.
SLEM 5 must not allow unattended or automatic logon via SSH.
SLEM 5 SSH daemon must disable forwarded remote X connections for interactive users, unless to fulfill documented and validated mission requirements.
SLEM 5 must display the date and time of the last successful account logon upon an SSH logon.
SLEM 5 SSH daemon must be configured to not allow authentication using known hosts authentication.
SLEM 5 SSH daemon must perform strict mode checking of home directory configuration files.
There must be no .shosts files on SLEM 5.
There must be no shosts.equiv files on SLEM 5.
SLEM 5 must not allow unattended or automatic logon via the graphical user interface (GUI).
All SLEM 5 local interactive user accounts, upon creation, must be assigned a home directory.
SLEM 5 default permissions must be defined in such a way that all authenticated users can only read and modify their own files.
SLEM 5 shadow password suite must be configured to enforce a delay of at least five seconds between logon prompts following a failed logon attempt.
All SLEM 5 local interactive users must have a home directory assigned in the /etc/passwd file.
All SLEM 5 local interactive user home directories defined in the /etc/passwd file must exist.
All SLEM 5 local interactive user initialization files executable search paths must contain only paths that resolve to the users' home directory.
All SLEM 5 local initialization files must not execute world-writable programs.
SLEM 5 must not have unnecessary accounts.
SLEM 5 must not have unnecessary account capabilities.
SLEM 5 root account must be the only account with unrestricted access to the system.
SLEM 5 must display the date and time of the last successful account logon upon logon.
SLEM 5 must enforce a delay of at least five seconds between logon prompts following a failed logon attempt via pluggable authentication modules (PAM).
SLEM 5 must use the invoking user's password for privilege escalation when using "sudo".
SLEM 5 must restrict privilege elevation to authorized personnel.
SLEM 5 must specify the default "include" directory for the /etc/sudoers file.
SLEM 5 must prevent the use of dictionary words for passwords.
SLEM 5 must not be configured to allow blank or null passwords.
SLEM 5 must not have accounts configured with blank or null passwords.
SLEM 5 must be configured to not overwrite Pluggable Authentication Modules (PAM) configuration on package changes.
SLEM 5 file integrity tool must be configured to verify Access Control Lists (ACLs).
SLEM 5 file integrity tool must be configured to verify extended attributes.
SLEM 5 must not disable syscall auditing.
The EMM system supporting the Samsung Android 14 BYOAD must be configured for autonomous monitoring, compliance, and validation to ensure security/configuration settings of mobile devices do not deviate from the approved configuration baseline.
The EMM system supporting the Samsung Android 14 BYOAD must be configured to initiate autonomous monitoring, compliance, and validation prior to granting the Samsung Android 14 BYOAD access to DOD information and IT resources.
The EMM system supporting the Samsung Android 14 BYOAD must be configured to detect if the Samsung Android 14 BYOAD native security controls are disabled.
The EMM system supporting the Samsung Android 14 BYOAD must be configured to detect if known malicious applications, blocked, or prohibited applications are installed on the Samsung Android 14 BYOAD (DOD-managed segment only).
The EMM detection/monitoring system must use continuous monitoring of enrolled Samsung Android 14 BYOAD.
The Samsung Android 14 BYOAD must be configured to either disable access to DOD data and IT systems and user accounts or wipe the work profile if the EMM system detects native security controls are disabled.
The Samsung Android 14 BYOAD must be configured to either disable access to DOD data and IT systems and user accounts or wipe the work profile if the EMM system detects the Samsung Android 14 BYOAD device has known malicious, blocked, or prohibited applications, or configured to access nonapproved third-party applications stores in the work profile.
The Samsung Android 14 BYOAD must be configured so that the work profile is removed if the device is no longer receiving security or software updates.
The EMM system supporting the Samsung Android 14 BYOAD must be NIAP validated (included on the NIAP list of compliant products or products in evaluation) unless the DOD CIO has granted an Approved Exception to Policy (E2P).
Samsung Android's Work profile must be configured to not allow installation of applications with the following characteristics:
- Back up MD data to non-DOD cloud servers (including user and application access to cloud backup services);
- Transmit MD diagnostic data to non-DOD servers;
- Voice assistant application if available when MD is locked;
- Voice dialing application if available when MD is locked;
- Allows synchronization of data or applications between devices associated with user; and
- Allows unencrypted (or encrypted but not FIPS 140-3 validated) data sharing with other MDs or printers.
- Apps which backup their own data to a remote system.
Samsung Android 14 must prohibit DOD VPN profiles in the Personal Profile.
The Samsung Android device work profile must be configured to disable automatic completion of workspace internet browser text input.
The TippingPoint SMS must be configured to send log data to at least two central log servers for the purpose of forwarding alerts to the administrators and the information system security officer (ISSO).
The process by which the Solidcore client Command Line Interface (CLI) Access Password is made available to administrators when needed must be documented in the organizations written policy.
For TOSS systems using Domain Name Servers (DNS) resolution, at least two name servers must be configured.
The debug-shell systemd service must be disabled on TOSS.
The root account must be the only account having unrestricted access to the TOSS system.
The systemd Ctrl-Alt-Delete burst key sequence in TOSS must be disabled.
There must be no ".shosts" files on The TOSS operating system.
TOSS must not allow blank or null passwords in the system-auth file.
TOSS must not be performing packet forwarding unless the system is a router.
The TOSS SSH daemon must not allow authentication using known host's authentication.
The TOSS SSH daemon must not allow compression or must only allow compression after successful authentication.
The TOSS SSH daemon must not allow Kerberos authentication, except to fulfill documented and validated mission requirements.
TOSS must not allow an unattended or automatic logon to the system.
All TOSS local interactive user accounts must be assigned a home directory upon creation.
All TOSS local interactive user home directories must be group-owned by the home directory owner's primary group.
All TOSS local interactive users must have a home directory assigned in the /etc/passwd file.
The x86 Ctrl-Alt-Delete key sequence in TOSS must be disabled if a graphical user interface is installed.
TOSS must disable the user list at logon for graphical user interfaces.
TOSS must display the date and time of the last successful account logon upon an SSH logon.
TOSS must not allow accounts configured with blank or null passwords.
TOSS must not have unnecessary accounts.
TOSS must define default permissions for all authenticated users in such a way that the user can only read and modify their own files.
All TOSS local interactive user home directories must have mode 0770 or less permissive.
All TOSS local interactive user home directories must be owned by root.
All TOSS local interactive user home directories must be owned by the user's primary group.
The auditd service must be running in TOSS.
TOSS must resolve audit information before writing to disk.
TOSS must have the packages required for offloading audit logs installed.
TOSS must have the packages required for encrypting offloaded audit logs installed.
The NSX Distributed Firewall must be configured to inspect traffic at the application layer.
The NSX Distributed Firewall must configure SpoofGuard to restrict it from accepting outbound packets that contain an illegitimate address in the source address.
The NSX Distributed Firewall must configure an IP Discovery profile to disable trust on every use methods.
The NSX Manager must not provide environment information to third parties.
The NSX Manager must be configured to conduct backups on an organizationally defined schedule.
The NSX Manager must obtain its public key certificates from an appropriate certificate policy through an approved service provider.
The NSX Manager must be running a release that is currently supported by the vendor.
The NSX Manager must disable SSH.
The NSX Manager must disable SNMP v2.
The NSX Manager must enable the global FIPS compliance mode for load balancers.
The NSX Manager must be configured as a cluster.
The NSX Managers must be deployed on separate physical hosts.
The NSX Tier-0 Gateway Firewall must be configured to send traffic log entries to a central audit server.
The NSX Tier-0 Gateway router must be configured to implement message authentication for all control plane protocols.
The NSX Tier-0 Gateway router must be configured to use its loopback address as the source address for Internal Border Gateway Protocol (IBGP) peering sessions.
The NSX Tier-0 Gateway router must be configured to advertise a hop limit of at least 32 in Router Advertisement messages for IPv6 stateless auto-configuration deployments.
The NSX Tier-0 Gateway router must be configured to use encryption for border gateway protocol (BGP) routing protocol authentication.
TOSS must prevent the use of dictionary words for passwords.
TOSS must enforce a delay of at least four seconds between logon prompts following a failed logon attempt.
A File Transfer Protocol (FTP) server package must not be installed unless mission essential on TOSS.
All TOSS local files and directories must have a valid group owner.
All TOSS local files and directories must have a valid owner.
Cron logging must be implemented in TOSS.
If the Trivial File Transfer Protocol (TFTP) server is required, the TOSS TFTP daemon must be configured to operate in secure mode.
The graphical display manager must not be installed on TOSS unless approved.
The TOSS file integrity tool must be configured to verify Access Control Lists (ACLs).
The TOSS file integrity tool must be configured to verify extended attributes.
The TOSS SSH daemon must perform strict mode checking of home directory configuration files.
The TOSS SSH private host key files must have mode 0600 or less permissive.
The TOSS SSH public host key files must have mode 0644 or less permissive.
The x86 Ctrl-Alt-Delete key sequence must be disabled on TOSS.
TOSS must be a vendor-supported release.
TOSS must be configured to prevent unrestricted mail relaying.
TOSS must define default permissions for logon and non-logon shells.
TOSS must disable access to network bpf syscall from unprivileged processes.
TOSS must enable hardening for the Berkeley Packet Filter Just-in-time compiler.
TOSS must enable the hardware random number generator entropy gatherer service.
TOSS must ensure the SSH server uses strong entropy.
TOSS must have the packages required to use the hardware random number generator entropy gatherer service.
TOSS must ignore IPv4 Internet Control Message Protocol (ICMP) redirect messages.
TOSS must ignore IPv6 Internet Control Message Protocol (ICMP) redirect messages.
TOSS must not accept router advertisements on all IPv6 interfaces by default.
TOSS must not accept router advertisements on all IPv6 interfaces.
TOSS must not allow blank or null passwords in the password-auth file.
TOSS must not allow interfaces to perform Internet Control Message Protocol (ICMP) redirects by default.
TOSS must not forward IPv4 source-routed packets by default.
TOSS must not forward IPv4 source-routed packets.
TOSS must not forward IPv6 source-routed packets by default.
TOSS must not forward IPv6 source-routed packets.
TOSS must not respond to Internet Control Message Protocol (ICMP) echoes sent to a broadcast address.
TOSS must not send Internet Control Message Protocol (ICMP) redirects.
TOSS must prevent IPv4 Internet Control Message Protocol (ICMP) redirect messages from being accepted.
TOSS must prevent IPv6 Internet Control Message Protocol (ICMP) redirect messages from being accepted.
TOSS must restrict exposed kernel pointer addresses access.
TOSS must restrict privilege elevation to authorized personnel.
TOSS must use reverse path filtering on all IPv4 interfaces.
TOSS network interfaces must not be in promiscuous mode.
The NSX Tier-1 Gateway firewall must be configured to send traffic log entries to a central audit server.
The NSX Tier-1 Gateway firewall must be configured to inspect traffic at the application layer.
The ESXi host must disable key persistence.
The ESXi host must deny shell access for the dcui account.
The ESXi host must disable virtual hardware management network interfaces.
The NSX Tier-1 Gateway router must be configured to advertise a hop limit of at least 32 in Router Advertisement messages for IPv6 stateless auto-configuration deployments.
The vCenter Server must disable accounts used for Integrated Windows Authentication (IWA).
The Photon operating system must not allow empty passwords.
All accounts, privileged and unprivileged, that require smart cards must have the underlying NT hash rotated at least every 60 days.
The impact of CPCON changes on the cross-directory authentication configuration must be considered and procedures documented.
Windows Server domain controllers must have Kerberos logging enabled with servers hosting Active Directory Certificate Services (AD CS).
Windows Server hosting Active Directory Certificate Services (AD CS) must enforce Certificate Authority (CA) certificate management approval for certificate requests.
Windows Server running Active Directory Certificate Services (AD CS) must be managed by a PAW tier 0.
Apple iOS/iPadOS 18 must be configured to enforce an application installation policy by specifying one or more authorized application repositories, including [selection: DOD-approved commercial app repository, MDM server, mobile application store].
Apple iOS/iPadOS 18 must implement the management setting: disable Allow MailDrop.
Apple iOS/iPadOS 18 must implement the management setting: enable USB Restricted Mode.
Apple iOS/iPadOS 18 must not allow managed apps to write contacts to unmanaged contacts accounts.
Apple iOS/iPadOS 18 must not allow unmanaged apps to read contacts from managed contacts accounts.
Apple iOS/iPadOS 18 must implement the management setting: disable AirDrop.
Apple iOS/iPadOS 18 must implement the management setting: disable paired Apple Watch.
Apple iOS/iPadOS 18 must implement the management setting: approved Apple Watches must be managed by an MDM.
Apple iOS/iPadOS 18 must disable "Password AutoFill" in browsers and applications.
Apple iOS/iPadOS 18 must disable "Allow setting up new nearby devices".
Apple iOS/iPadOS 18 must disable password proximity requests.
Apple iOS/iPadOS 18 must disable password sharing.
Apple iOS/iPadOS 18 must disable "Find My Friends" in the "Find My" app.
The Apple iOS/iPadOS 18 must be supervised by the MDM.
Apple iOS/iPadOS 18 must disable "Allow network drive access in Files access".
Apple iOS/iPadOS 18 must disable connections to Siri servers for the purpose of dictation.
Apple iOS/iPadOS 18 must disable connections to Siri servers for the purpose of translation.
Apple iOS/iPadOS 18 must disable copy/paste of data from managed to unmanaged applications.
Apple iOS/iPadOS 18 must disable the installation of alternative marketplace apps.
Apple iOS/iPadOS 18 must disable app installation from a website.
Apple iOS/iPadOS 18 must disable ChatGPT connection for Apple Intelligence.
Apple iOS/iPadOS 18 must disable the download of iOS/iPadOS beta updates.
The UEM server must be configured to have at least one user in defined administrator roles.