Firefox must be configured to disable the installation of extensions.
Firefox autoplay must be disabled.
Enabled Firefox Cryptomining protection
Disable Firefox deprecated ciphers
Firefox must be configured to disable form fill assistance.
Firefox must be configured so that DNS over HTTPS is disabled.
Firefox encrypted media extensions must be disabled.
Enabled Firefox Enhanced Tracking Protection
Disabled Firefox Extension Recommendations
Firefox must be configured to not automatically update installed add-ons and plugins.
Firefox feedback reporting must be disabled.
Enabled Firefox Fingerprinting Protection
Disable JavaScript's Raise Or Lower Windows Capability
Disable JavaScript's Moving Or Resizing Windows Capability
Disable Firefox network prediction
Firefox must be configured to not delete data upon shutdown.
The Firefox New Tab page must not show Top Sites, Sponsored Top sites, Pocket Recommendations, Sponsored Pocket Stories, Searches, Highlights, or Snippets.
Firefox must be configured to not use a password store with or without a master password.
Enable Firefox Pop-up Blocker
Firefox private browsing must be disabled.
Firefox search suggestions must be disabled.
Disable Installed Search Plugins Update Checking
Firefox accounts must be disabled.
Disable Firefox Telemetry
Firefox must not recommend extensions as the user is using the browser.
Uninstall abrt-addon-ccpp Package
Uninstall abrt-addon-kerneloops Package
Uninstall abrt-addon-python Package
Uninstall abrt-cli Package
Uninstall abrt-plugin-logger Package
Uninstall abrt-plugin-rhtsupport Package
Uninstall abrt-plugin-sosreport Package
Uninstall gssproxy Package
Uninstall libreport-plugin-logger Package
Uninstall libreport-plugin-rhtsupport Package
Disable the uvcvideo module
Disable IEEE 1394 (FireWire) Support
Disable Mounting of cramfs
Uninstall Automatic Bug Reporting Tool (abrt)
Disable Network Console (netconsole)
Disable Odd Job Daemon (oddjobd)
Uninstall Sendmail Package
Uninstall rsh-server Package
Uninstall telnet-server Package
Uninstall python3-abrt-addon Package
Enable Kernel Page-Table Isolation (KPTI)
Disable chrony daemon from acting as server
Disable network management of chrony daemon
Uninstall abrt-libs Package
Uninstall abrt-server-info-page Package
The A10 Networks ADC must not have unnecessary scripts installed.
The A10 Networks ADC must use DNS Proxy mode when Global Server Load Balancing is used.
AAA Services must be configured to disable non-essential modules.
Adobe Acrobat Pro DC Continuous PDF file attachments must be blocked.
Adobe Acrobat Pro DC Continuous access to unknown websites must be restricted.
Adobe Acrobat Pro DC Continuous access to websites must be blocked.
Adobe Acrobat Pro DC Continuous must be configured to block Flash Content.
The Adobe Acrobat Pro DC Continuous Send and Track plugin for Outlook must be disabled.
Adobe Acrobat Pro DC Continuous must disable the ability to store files on Acrobat.com.
Adobe Acrobat Pro DC Continuous Cloud Synchronization must be disabled.
Adobe Acrobat Pro DC Continuous Repair Installation must be disabled.
Adobe Acrobat Pro DC Continuous third-party web connectors must be disabled.
Adobe Acrobat Pro DC Continuous Webmail must be disabled.
The Adobe Acrobat Pro DC Continuous Welcome Screen must be disabled.
Adobe Acrobat Pro DC Continuous SharePoint and Office365 access must be disabled.
Adobe Reader DC must disable the Adobe Send and Track plugin for Outlook.
Adobe Reader DC must disable all service access to Document Cloud Services.
Adobe Reader DC must disable Cloud Synchronization.
Adobe Reader DC must disable the Adobe Repair Installation.
Adobe Reader DC must disable 3rd Party Web Connectors.
Adobe Reader DC must disable Acrobat Upsell.
Adobe Reader DC must disable Adobe Send for Signature.
Adobe Reader DC must disable access to Webmail.
Adobe Reader DC must disable Online SharePoint Access.
Adobe Reader DC must disable the Adobe Welcome Screen.
Adobe Reader DC must disable Service Upgrades.
The Apache web server must not perform user management for hosted applications.
The Apache web server must only contain services and functions necessary for operation.
The Apache web server must not be a proxy server.
The Apache web server must provide install options to exclude the installation of documentation, sample code, example applications, and tutorials.
Apache web server application directories, libraries, and configuration files must only be accessible to privileged users.
The Apache web server must have resource mappings set to disable the serving of certain file types.
The Apache web server must allow the mappings to unused and vulnerable scripts to be removed.
The Apache web server must have Web Distributed Authoring (WebDAV) disabled.
Users and scripts running on behalf of users must be contained to the document root or home directory tree of the Apache web server.
The ALG must not have unnecessary services and functions enabled.
The ALG must be configured to remove or disable unrelated or unneeded application proxy services.
The Arista Multilayer Switch must be configured to disable non-essential capabilities.
The Arista router must be configured to have all non-essential capabilities disabled.
The application server must adhere to the principles of least functionality by providing only essential capabilities.
The application must be configured to disable non-essential capabilities.
The CA API Gateway must not have unnecessary services and functions enabled.
The CA API Gateway must be configured to remove or disable unrelated or unneeded application proxy services.
The EMPDEMO databases, database objects, and applications must be removed.
Default demonstration and sample databases, database objects, and applications must be removed.
IDMS components that cannot be uninstalled must be disabled.
The Central Log Server must be configured to disable non-essential capabilities.
Citrix Delivery Controller must be configured to disable non-essential capabilities.
Delivery Controller must be configured to disable non-essential capabilities.
TCP socket binding for all Docker Engine - Enterprise nodes in a Universal Control Plane (UCP) cluster must be disabled.
LDAP integration in Docker Enterprise must be configured.
The insecure registry capability in the Docker Engine - Enterprise component of Docker Enterprise must be disabled.
On Linux, a non-AUFS storage driver in the Docker Engine - Enterprise component of Docker Enterprise must be used.
The userland proxy capability in the Docker Engine - Enterprise component of Docker Enterprise must be disabled.
Experimental features in the Docker Engine - Enterprise component of Docker Enterprise must be disabled.
The Docker Enterprise self-signed certificates in Universal Control Plane (UCP) must be replaced with DoD trusted, signed certificates.
The Docker Enterprise self-signed certificates in Docker Trusted Registry (DTR) must be replaced with DoD trusted, signed certificates.
The option in Universal Control Plane (UCP) allowing users and administrators to schedule containers on all nodes, including UCP managers and Docker Trusted Registry (DTR) nodes must be disabled in Docker Enterprise.
The Create repository on push option in Docker Trusted Registry (DTR) must be disabled in Docker Enterprise.
Periodic data usage and analytics reporting in Universal Control Plane (UCP) must be disabled in Docker Enterprise.
Periodic data usage and analytics reporting in Docker Trusted Registry (DTR) must be disabled in Docker Enterprise.
An appropriate AppArmor profile must be enabled on Ubuntu systems for Docker Enterprise.
SELinux security options must be set on Red Hat or CentOS systems for Docker Enterprise.
Linux Kernel capabilities must be restricted within containers as defined in the System Security Plan (SSP) for Docker Enterprise.
Privileged Linux containers must not be used for Docker Enterprise.
SSH must not run within Linux containers for Docker Enterprise.
Only required ports must be open on the containers in Docker Enterprise.
Docker Enterprise hosts network namespace must not be shared.
Memory usage for all containers must be limited in Docker Enterprise.
Docker Enterprise CPU priority must be set appropriately on all containers.
All Docker Enterprise containers root filesystem must be mounted as read only.
Docker Enterprise host devices must not be directly exposed to containers.
Mount propagation mode must not set to shared in Docker Enterprise.
The Docker Enterprise hosts UTS namespace must not be shared.
The Docker Enterprise default seccomp profile must not be disabled.
Docker Enterprise exec commands must not be used with privileged option.
Docker Enterprise exec commands must not be used with the user option.
cgroup usage must be confirmed in Docker Enterprise.
All Docker Enterprise containers must be restricted from acquiring additional privileges.
The Docker Enterprise hosts user namespace must not be shared.
The Docker Enterprise socket must not be mounted inside any containers.
The firewall must disable or remove unnecessary network services and functions that are not used as part of its role in the architecture.
The FortiGate firewall must disable or remove unnecessary network services and functions that are not used as part of its role in the architecture.
Google Android 12 must be configured to disable developer modes.
Google Android 13 must be configured to disable developer modes.
The HP FlexFabric Switch must be configured to disable non-essential capabilities.
The storage system in a hardened configuration must be configured to disable the Remote Copy feature, unless needed.
Default demonstration and sample databases, database objects, and applications must be removed.
Unused database components, DBMS software, and database objects must be removed.
Unused database components which are integrated in DB2 and cannot be uninstalled must be disabled.
Access to external executables must be disabled or restricted.
The IBM Aspera Platform must not have unnecessary services and functions enabled.
The WebSphere Application Server process must not be started from the command line with the -password option.
The WebSphere Application Server files must be owned by the non-root WebSphere user ID.
The WebSphere Application Server sample applications must be removed.
The WebSphere Application Server must remove JREs left by web server and plug-in installers for web servers and plugins running in the DMZ.
The WebSphere Application Server must be run as a non-admin user.
The WebSphere Application Server must disable JSP class reloading.
IBM z/VM must be configured to disable non-essential capabilities.
The IDPS must be configured to remove or disable non-essential features, functions, and services of the IDPS application.
The IDPS must be configured to remove or disable non-essential capabilities which are not required for operation or not related to IDPS functionality (e.g., DNS, email client or server, FTP server, or web server).
JBoss process owner interactive access must be restricted.
Google Analytics must be disabled in EAP Console.
JBoss process owner execution permissions must be limited.
JBoss QuickStarts must be removed.
Remote access to JMX subsystem must be disabled.
Welcome Web Application must be disabled.
Any unapproved applications must be removed.
The Juniper router must be configured to have all non-essential capabilities disabled.
The Juniper SRX Services Gateway Firewall must disable or remove unnecessary network services and functions that are not used as part of its role in the architecture.
The Juniper SRX Services Gateway Firewall must not be configured as an NTP server since providing this network service is unrelated to the role as a firewall.
The Juniper SRX Services Gateway Firewall must not be configured as a DNS proxy since providing this network service is unrelated to the role as a Firewall.
The Juniper SRX Services Gateway Firewall must not be configured as a DHCP server since providing this network service is unrelated to the role as a Firewall.
The layer 2 switch must be configured to disable non-essential capabilities.
The Juniper SRX Services Gateway must disable or remove unnecessary network services and functions that are not used as part of its role in the architecture.
The Mainframe Product must be configured to disable non-essential capabilities.
The Save commands default file format must be configured.
Trust access for VBA must be disallowed.
Warning Bar settings for VBA macros must be configured.
Warning Bar settings for VBA macros must be configured.
The Default file format must be set.
Database functionality configurations must be displayed to the user.
Microsoft Android 11 must be configured to disable trust agents. Note: This requirement is not applicable (NA) for specific biometric authentication factors included in the product's Common Criteria evaluation.
Microsoft Android 11 must be configured to disable developer modes.
Motorola Solutions Android 11 must be configured to disable trust agents.
Note: This requirement is not applicable (NA) for specific biometric authentication factors included in the product's Common Criteria evaluation.
Motorola Solutions Android 11 must be configured to disable developer modes.
Motorola Solutions Android 11 must be configured to disable USB mass storage mode.
Motorola Solutions Android 11 must allow only the Administrator (EMM) to perform the following management function: Enable/disable location services.
Firefox must be configured to not automatically check for updated versions of installed search plugins.
Firefox must be configured to block pop-up windows.
Firefox must be configured to prevent JavaScript from moving or resizing windows.
Firefox must be configured to prevent JavaScript from raising or lowering windows.
Background submission of information to Mozilla must be disabled.
Firefox autoplay must be disabled.
Firefox network prediction must be disabled.
Firefox fingerprinting protection must be enabled.
Firefox cryptomining protection must be enabled.
Firefox Enhanced Tracking Protection must be enabled.
Firefox extension recommendations must be disabled.
Firefox deprecated ciphers must be disabled.
The Firefox New Tab page must not show Top Sites, Sponsored Top Sites, Pocket Recommendations, Sponsored Pocket Stories, Searches, Highlights, or Snippets.
Firefox Studies must be disabled.
Trust access for VBA must be disallowed.
The Save commands default file format must be configured.
Microsoft Android 11 must be configured to disable trust agents.
Note: This requirement is not applicable (NA) for specific biometric authentication factors included in the product's Common Criteria evaluation.
Azure SQL Database default demonstration and sample databases, database objects, and applications must be removed.
Save files default format must be configured.
Background processing must be disabled.
The ability of sites to show pop-ups must be disabled.
The default search provider must be set to use an encrypted connection.
Data Synchronization must be disabled.
Network prediction must be disabled.
Search suggestions must be disabled.
Importing of autofill form data must be disabled.
Importing of browser settings must be disabled.
Importing of cookies must be disabled.
Importing of extensions must be disabled.
Importing of browsing history must be disabled.
Importing of home page settings must be disabled.
Importing of open tabs must be disabled.
Importing of payment info must be disabled.
Importing of saved passwords must be disabled.
Importing of search engine settings must be disabled.
Importing of shortcuts must be disabled.
Autoplay must be disabled.
Google Cast must be disabled.
Web Bluetooth API must be disabled.
Autofill for Credit Cards must be disabled.
Autofill for addresses must be disabled.
Personalization of ads, search, and news by sending browsing history to Microsoft must be disabled.
Site tracking of a user’s location must be disabled.
Edge development tools must be disabled.
Download restrictions must be configured.
Extensions installation must be blocklisted by default.
Site isolation for every site must be enabled.
Microsoft Defender SmartScreen must be enabled.
Microsoft Defender SmartScreen must be configured to block potentially unwanted apps.
The download location prompt must be configured.
The collections feature must be disabled.
The Share Experience feature must be disabled.
Guest mode must be disabled.
Use of the QUIC protocol must be disabled.
The list of domains media autoplay allows must be allowlisted if used.
The Save commands default file format must be configured.
Exchange must have Send Fatal Errors to Microsoft disabled.
Exchange must not send Customer Experience reports to Microsoft.
Exchange IMAP4 service must be disabled.
Exchange POP3 service must be disabled.
Exchange must have the Public Folder virtual directory removed if not in use by the site.
Exchange must have the Microsoft Active Sync directory removed.
Exchange Send Fatal Errors to Microsoft must be disabled.
The Exchange IMAP4 service must be disabled.
The Exchange POP3 service must be disabled.
The Opt-In Wizard must be disabled.
The Customer Experience Improvement Program for Office must be disabled.
Automatic receiving of small updates to improve reliability must be disallowed.
The Internet Fax Feature must be disabled.
Online content options must be configured for offline content availability.
The video informing a user about signing into Office365 must be disabled.
The first-run prompt to sign into Office365 must be disabled.
The ability to sign into Office365 must be disabled.
The ability to automatically hyperlink screenshots within Word, PowerPoint, Excel and Outlook must be disabled.
The prompt to save to OneDrive (formerly SkyDrive) must be disabled.
Office Presentation Service must be removed as an option for presenting PowerPoint and Word online.
The Office Feedback tool must be disabled.
Roaming settings must be stored locally and not synchronized to the Microsoft Office roaming settings web service.
The ability of the Office Telemetry Agent to periodically upload telemetry data to a shared folder must be disabled.
The Office Telemetry Agent and Office applications must be configured to collect telemetry data.
Folders in non-default stores, set as folder home pages, must be disallowed.
Internet calendar integration in Outlook must be disabled.
Office Presentation Service must be removed as an option for presenting PowerPoint and Word online.
Microsoft passport Service for content must be disallowed.
Hyperlinks to web templates in File | New and task panes must be disabled.
Office Live Workspace Integration must be off.
The use of personal accounts for OneDrive synchronization must be disabled.
Do not include Internet Calendar Integration in Outlook must be enforced.
RSS feed synchronization with Common Feed List must be disallowed.
RSS Feeds must be disallowed.
Dragging Unicode eMail messages to file system must be disallowed.
User Entries to Server List must be disallowed.
Automatically downloading enclosures on RSS must be disallowed.
Dragging Unicode email messages to file system must be disallowed.
The use of the weather bar in Outlook must be disabled
Internet calendar integration in Outlook must be disabled.
User Entries to Server List must be disallowed.
SQL Server default account [sa] must have its name changed.
SQL Server must have the publicly available Northwind sample database removed.
SQL Server must have the publicly available pubs sample database removed.
SQL Server must have the publicly available AdventureWorks sample database removed.
SQL Server must have the SQL Server Data Tools (SSDT) software component removed if it is unused.
SQL Server must have the SQL Server Reporting Services (SSRS) software component removed if it is unused.
SQL Server must have the SQL Server Integration Services (SSIS) software component removed if it is unused.
SQL Server must have the SQL Server Analysis Services (SSAS) software component removed if it is unused.
SQL Server must have the SQL Server Distributed Replay Client software component removed if it is unused.
SQL Server must have the SQL Server Distributed Replay Controller software component removed if it is unused.
SQL Server must have the Full-Text Search software component removed if it is unused.
SQL Server must have the Master Data Services software component removed if it is unused.
SQL Server must have the SQL Server Replication software component removed if it is unused.
SQL Server must have the Data Quality Client software component removed if it is unused.
SQL Server must have the Data Quality Services software component removed if it is unused.
SQL Server must have the Client Tools SDK software component removed if it is unused.
SQL Server must have the Management Tools software component removed if it is unused.
SQL Server must have the Filestream feature disabled if it is unused.
Unused database components that are integrated in SQL Server and cannot be uninstalled must be disabled.
The SQL Server default account [sa] must be disabled.
Access to xp_cmdshell must be disabled, unless specifically required and approved.
Nutanix AOS must not have the rsh-server package installed.
Nutanix AOS must not have the ypserv package installed.
Nutanix AOS must not have the telnet-server package installed.
OHS must have the LoadModule file_cache_module directive disabled.
OHS must have the LoadModule vhost_alias_module directive disabled.
OHS must have the LoadModule env_module directive disabled.
OHS must have the LoadModule mime_magic_module directive disabled.
OHS must have the LoadModule negotiation_module directive disabled.
OHS must not have the LanguagePriority directive enabled.
OHS must not have the ForceLanguagePriority directive enabled.
OHS must have the LoadModule status_module directive disabled.
OHS must have the LoadModule info_module directive disabled.
OHS must have the LoadModule include_module directive disabled.
OHS must have the LoadModule autoindex_module directive disabled.
OHS must have the IndexOptions directive disabled.
OHS must have the AddIconByEncoding directive disabled.
OHS must have the AddIconByType directive disabled.
OHS must have the AddIcon directive disabled.
OHS must have the DefaultIcon directive disabled.
OHS must have the ReadmeName directive disabled.
OHS must have the HeaderName directive disabled.
OHS must have the IndexIgnore directive disabled.
OHS must have the LoadModule dir_module directive disabled.
OHS must have the DirectoryIndex directive disabled.
OHS must have the LoadModule cgi_module directive disabled.
OHS must have the LoadModule fastcgi_module disabled.
OHS must have the LoadModule cgid_module directive disabled for mpm workers.
OHS must have the IfModule cgid_module directive disabled.
OHS must have the LoadModule mpm_winnt_module directive disabled.
OHS must have the ScriptAlias directive for CGI scripts disabled.
OHS must have the ScriptSock directive disabled.
OHS must have the cgi-bin directory disabled.
OHS must have directives pertaining to certain scripting languages removed from virtual hosts.
OHS must have the LoadModule asis_module directive disabled.
OHS must have the LoadModule imagemap_module directive disabled.
OHS must have the LoadModule actions_module directive disabled.
OHS must have the LoadModule speling_module directive disabled.
OHS must have the LoadModule userdir_module directive disabled.
OHS must have the AliasMatch directive pertaining to the OHS manuals disabled.
OHS must have the Directory directive pointing to the OHS manuals disabled.
OHS must have the LoadModule auth_basic_module directive disabled.
OHS must have the LoadModule authz_user_module directive disabled.
OHS must have the LoadModule authn_file_module directive disabled.
OHS must have the LoadModule authn_anon_module directive disabled.
OHS must have the LoadModule proxy_module directive disabled.
OHS must have the LoadModule proxy_http_module directive disabled.
OHS must have the LoadModule proxy_ftp_module directive disabled.
OHS must have the LoadModule proxy_connect_module directive disabled.
OHS must have the LoadModule proxy_balancer_module directive disabled.
OHS must have the LoadModule cern_meta_module directive disabled.
OHS must have the LoadModule expires_module directive disabled.
OHS must have the LoadModule usertrack_module directive disabled.
OHS must have the LoadModule uniqueid_module directive disabled.
OHS must have the LoadModule setenvif_module directive disabled.
OHS must have the BrowserMatch directive disabled.
OHS must have the LoadModule dumpio_module directive disabled.
OHS must have the IfModule dumpio_module directive disabled.
OHS must have the Alias /icons/ directive disabled.
OHS must have the path to the icons directory disabled.
OHS must have the IfModule mpm_winnt_module directive disabled.
OHS must disable the directive pointing to the directory containing the OHS manuals.
OHS must have the AliasMatch directive disabled for the OHS manuals.
OHS must have the AddHandler directive disabled.
OHS must have the LoadModule cgid_module directive disabled.
OHS must have the IfModule cgid_module directive disabled for the OHS server, virtual host, and directory configuration.
OHS must have the LoadModule cgi_module directive disabled within the IfModule mpm_winnt_module directive.
OHS must have the ScriptAlias /cgi-bin/ directive within a IfModule alias_module directive disabled.
OHS must have the ScriptSock directive within a IfModule cgid_module directive disabled.
OHS must have resource mappings set to disable the serving of certain file types.
Users and scripts running on behalf of users must be contained to the document root or home directory tree of OHS.
If WebLogic is not in use with OHS, OHS must have the include mod_wl_ohs.conf directive disabled at the server level.
If mod_plsql is not in use with OHS, OHS must have the include moduleconf/* directive disabled.
Oracle WebLogic must adhere to the principles of least functionality by providing only essential capabilities.
Prisma Cloud Compute Cloud Native Network Firewall (CNNF) automatically monitors layer 4 (TCP) intercontainer communications. Enforcement policies must be created.
Prisma Cloud Compute host compliance baseline policies must be set.
Images stored within the container registry must contain only images to be run as containers within the container platform.
Prisma Cloud Compute must be configured to scan images that have not been instantiated as containers.
The router must be configured to have all non-essential capabilities disabled.
The Riverbed Optimization System (RiOS) must not have unrelated or unnecessary services enabled on the host.
Riverbed Optimization System (RiOS) must not have unnecessary services and functions enabled.
The SDN controller must be configured to disable non-essential capabilities.
The SEL-2740S must be configured to permit the allowed and necessary ports, functions, protocols, and services.
Samsung Android must be configured to disable trust agents.
NOTE: This requirement is not applicable (NA) for specific biometric authentication factors included in the product Common Criteria evaluation.
Samsung Android must be configured to disable Face Recognition.
NOTE: This requirement is not applicable (NA) for specific biometric authentication factors included in the product Common Criteria evaluation.
Samsung Android must be configured to disable developer modes.
Samsung Android must be configured to disable USB mass storage mode.
When Splunk Enterprise is distributed over multiple servers, each server must be configured to disable non-essential capabilities.
Symantec ProxySG must not have unnecessary services and functions enabled.
Symantec ProxySG must be configured to remove or disable unrelated or unneeded application proxy services.
The SMS must be configured to remove or disable non-essential capabilities on SMS and TPS which are not required for operation or not related to IDPS functionality (e.g., web server, SSH, telnet, and TAXII).
The UEM server must be configured to disable non-essential capabilities.
The NSX-T Tier-1 Gateway must be configured to have the DHCP service disabled if not in use.
The NSX-T Tier-0 Gateway must be configured to have the DHCP service disabled if not in use.
The NSX-T Tier-0 Gateway must be configured to have routing protocols disabled if not in use.
The NSX-T Tier-0 Gateway must be configured to have multicast disabled if not in use.
The NSX-T Tier-1 Gateway must be configured to have multicast disabled if not in use.
The Apache web server must have Multipurpose Internet Mail Extensions (MIME) that invoke operating system shell programs disabled.
The Apache web server must allow mappings to unused and vulnerable scripts to be removed.
Stack tracing must be disabled.
The shutdown port must be disabled.
Unapproved connectors must be disabled.
DefaultServlet debug parameter must be disabled.
DefaultServlet directory listings parameter must be disabled.
The deployXML attribute must be set to false in hosted environments.
Autodeploy must be disabled.
xpoweredBy attribute must be disabled.
Example applications must be removed.
Tomcat default ROOT web application must be removed.
Documentation must be removed.
Apple iOS/iPadOS 16 must implement the management setting: Encrypt iTunes backups/Encrypt local backup.
iPhone and iPad must have the latest available iOS/iPadOS operating system installed.
Apple iOS/iPadOS 16 must implement the management setting: force Apple Watch wrist detection.
Apple iOS/iPadOS 16 users must complete required training.
Apple iOS/iPadOS 17 must implement the management setting: not allow automatic completion of Safari browser passcodes.
Apple iOS/iPadOS 17 must implement the management setting: Encrypt backups/Encrypt local backup.
Apple iOS/iPadOS 17 must implement the management setting: not allow use of Handoff.
Apple iOS/iPadOS 17 must implement the management setting: not allow use of iPhone widgets on Mac.
Apple iOS/iPadOS 17 must implement the management setting: force Apple Watch wrist detection.
Apple iOS/iPadOS 17 users must complete required training.
Apple iOS/iPadOS 16 must implement the management setting: Not allow automatic completion of Safari browser passcodes.
Apple iOS/iPadOS 16 must implement the management setting: not allow use of Handoff.
Apple iOS/iPadOS 16 must implement the management setting: Disable Allow Shared Albums.
Apple iOS/iPadOS 16 must implement the management setting: Force Apple Watch wrist detection.
The macOS system must be configured to disable SMB File Sharing unless it is required.
The macOS system must be configured to disable the Network File System (NFS) daemon unless it is required.
The macOS system must be configured to disable Location Services.
The macOS system must be configured to disable Bonjour multicast advertising.
The macOS system must be configured to disable the UUCP service.
The macOS system must be configured to disable Internet Sharing.
The macOS system must be configured to disable Web Sharing.
The macOS system must be configured to disable AirDrop.
The macOS system must be configured to disable the iCloud Calendar services.
The macOS system must be configured to disable the iCloud Reminders services.
The macOS system must be configured to disable iCloud Address Book services.
The macOS system must be configured to disable the Mail iCloud services.
The macOS system must be configured to disable the iCloud Notes services.
The macOS system must cover or disable the built-in or attached camera when not in use.
The macOS system must be configured to disable Siri and dictation.
The macOS system must be configured to disable the system preference pane for Internet Accounts.
The macOS system must be configured to disable the Cloud Setup services.
The macOS system must be configured to disable the Privacy Setup services.
The macOS system must be configured to disable the Cloud Storage Setup services.
The macOS system must be configured to disable the Siri Setup services.
The macOS system must disable iCloud Keychain synchronization.
The macOS system must disable iCloud document synchronization.
The macOS system must disable iCloud bookmark synchronization.
The macOS system must disable iCloud photo library.
The macOS system must be configured to disable the system preference pane for TouchID.
The macOS system must be configured to disable the system preference pane for Wallet and ApplePay.
The macOS system must be configured to disable the system preference pane for Siri.
The macOS system must be configured to disable prompts to configure Touch ID.
The macOS system must be configured to disable prompts to configure ScreenTime.
The macOS system must be configured to disable promts to configure Unlock with Watch.
The macOS system must be configured to prevent activity continuation between Apple Devices.
The macOS system must be configured to prevent password proximity sharing requests from nearby Apple Devices.
The macOS system must be configured to prevent users from erasing all system content and settings.
The macOS system must be configured to disable the iCloud Mail services.
The macOS system must disable iCloud Document synchronization.
The macOS system must disable iCloud Bookmark synchronization.
The macOS system must disable the iCloud Photo Library.
The macOS system must be configured to disable the system preference pane for TouchID and Password.
The macOS system must be configured to disable prompts to configure Unlock with Watch.
The macOS system must be configured to prevent activity continuation between Apple devices.
The macOS system must be configured to prevent password proximity sharing requests from nearby Apple devices.
The macOS system must disable Location Services.
The macOS system must disable Bonjour multicast.
The macOS system must disable Internet Sharing.
The macOS system must disable AirDrop.
The macOS system must disable FaceTime.app.
The macOS system must disable the iCloud Calendar services.
The macOS system must disable iCloud Reminders.
The macOS system must disable iCloud Address Book.
The macOS system must disable iCloud Mail.
The macOS system must disable iCloud Notes.
The macOS system must disable the camera.
The macOS system must disable Siri.
The macOS system must disable Apple ID setup during Setup Assistant.
The macOS system must disable Privacy Setup services during Setup Assistant.
The macOS system must disable iCloud Storage Setup during Setup Assistant.
The macOS system must disable Siri Setup during Setup Assistant.
The macOS system must disable iCloud Bookmarks.
The macOS system must disable iCloud Photo Library.
The macOS system must disable the TouchID System Settings pane.
The macOS system must disable the System Settings pane for Wallet and Apple Pay.
The macOS system must disable the system settings pane for Siri.
The Ubuntu operating system must not have the Network Information Service (NIS) package installed.
The Ubuntu operating system must not have the rsh-server package installed.
The macOS system must disable Airplay Receiver.
The macOS system must disable Bluetooth sharing.
The macOS system must disable AppleID and Internet Account modifications.
The macOS system must disable CD/DVD Sharing.
The macOS system must disable content caching service.
The macOS system must disable iCloud desktop and document folder synchronization.
The macOS system must disable iCloud Game Center.
The macOS system must disable iCloud Private Relay.
The macOS system must disable Find My service.
The macOS system must disable password autofill.
The macOS system must disable personalized advertising.
The macOS system must disable sending Siri and Dictation information to Apple.
The macOS system must enforce on device dictation.
The macOS system must disable dictation.
The macOS system must disable Printer Sharing.
The macOS system must disable Remote Management.
The macOS system must disable the Bluetooth system settings pane.
The macOS system must disable the iCloud Freeform services.
The macOS system must disable TouchID prompt during Setup Assistant.
The macOS system must disable Screen Time prompt during Setup Assistant.
The macOS system must disable Unlock with Apple Watch during Setup Assistant.
The macOS system must disable Handoff.
The macOS system must disable proximity-based password sharing requests.
The macOS system must disable Erase Content and Settings.
The Cisco ASA must be configured to disable or remove unnecessary network services and functions that are not used as part of its role in the architecture.
Unused database components, PostgreSQL software, and database objects must be removed.
Unused database components that are integrated in PostgreSQL and cannot be uninstalled must be disabled.
The Cisco router must be configured to have all non-essential capabilities disabled.
The Cisco switch must be configured to have all non-essential capabilities disabled.
The container platform must be configured with only essential configurations.
The container platform registry must contain only container images for those capabilities being offered by the container platform.
Default, demonstration and sample databases, database objects, and applications must be removed.
Unused database components, EDB Postgres Advanced Server software, and database objects must be removed.
Unused database components which are integrated in the EDB Postgres Advanced Server and cannot be uninstalled must be disabled.
Unused database components that are integrated in the DBMS and cannot be uninstalled must be disabled.
Sites ability to show pop-ups must be disabled.
The default search providers name must be set.
The default search provider URL must be set to perform encrypted searches.
Default search provider must be enabled.
The Password Manager must be disabled.
The URL protocol schema javascript must be disabled.
Metrics reporting to Google must be disabled.
Google Android 14 must be configured to disable developer modes.
Google Android 14 must be configured to disable all Bluetooth profiles except for HSP (Headset Profile), HFP (Hands-Free Profile), SPP (Serial Port Profile), A2DP (Advanced Audio Distribution Profile), AVRCP (Audio/Video Remote Control Profile), and PBAP (Phone Book Access Profile).
The operating system must be configured to disable non-essential capabilities.
The HPE 3PAR OS must be configured to disable nonessential web-services.
The HPE 3PAR OS must be configured to disable nonessential Common Information Model services.
The HPE 3PAR OS must be configured to disable nonessential VASA VVol services.
The HPE 3PAR OS must be configured to disable nonessential Remote Copy services.
The AIX qdaemon must be disabled if local or remote printing is not required.
If AIX system does not act as a remote print server for other servers, the lpd daemon must be disabled.
If AIX system does not support either local or remote printing, the piobe service must be disabled.
If there are no X11 clients that require CDE on AIX, the dt service must be disabled.
If NFS is not required on AIX, the NFS daemon must be disabled.
If sendmail is not required on AIX, the sendmail service must be disabled.
If SNMP is not required on AIX, the snmpd service must be disabled.
The AIX DHCP client must be disabled.
If DHCP is not enabled in the network on AIX, the dhcprd daemon must be disabled.
If IPv6 is not utilized on AIX server, the autoconf6 daemon must be disabled.
If AIX server is not functioning as a network router, the gated daemon must be disabled.
If AIX server is not functioning as a multicast router, the mrouted daemon must be disabled.
If AIX server is not functioning as a DNS server, the named daemon must be disabled.
If AIX server is not functioning as a network router, the routed daemon must be disabled.
If rwhod is not required on AIX, the rwhod daemon must be disabled.
The timed daemon must be disabled on AIX.
If AIX server does not host an SNMP agent, the dpid2 daemon must be disabled.
If SNMP is not required on AIX, the snmpmibd daemon must be disabled.
The aixmibd daemon must be disabled on AIX.
The ndpd-host daemon must be disabled on AIX.
The ndpd-router must be disabled on AIX.
The daytime daemon must be disabled on AIX.
The cmsd daemon must be disabled on AIX.
The ttdbserver daemon must be disabled on AIX.
The uucp (UNIX to UNIX Copy Program) daemon must be disabled on AIX.
The time daemon must be disabled on AIX.
The talk daemon must be disabled on AIX.
The ntalk daemon must be disabled on AIX.
The chargen daemon must be disabled on AIX.
The discard daemon must be disabled on AIX.
The dtspc daemon must be disabled on AIX.
The pcnfsd daemon must be disabled on AIX.
The rstatd daemon must be disabled on AIX.
The rusersd daemon must be disabled on AIX.
The sprayd daemon must be disabled on AIX.
The klogin daemon must be disabled on AIX.
The kshell daemon must be disabled on AIX.
The rquotad daemon must be disabled on AIX.
The tftp daemon must be disabled on AIX.
The imap2 service must be disabled on AIX.
The pop3 daemon must be disabled on AIX.
The finger daemon must be disabled on AIX.
The instsrv daemon must be disabled on AIX.
The echo daemon must be disabled on AIX.
The Internet Network News (INN) server must be disabled on AIX.
If DHCP server is not required on AIX, the DHCP server must be disabled.
The rwalld daemon must be disabled on AIX.
IBM z/OS Inapplicable PPT entries must be invalidated.
IBM z/OS must not have inaccessible APF libraries defined.
IBM z/OS LNKAUTH=APFTAB must be specified in the IEASYSxx member(s) in the currently active parmlib data set(s).
Duplicated IBM z/OS sensitive utilities and/or programs must not exist in APF libraries.
IBM zOS inapplicable PPT entries must be invalidated.
IBM z/OS must not have duplicated sensitive utilities and/or programs existing in APF libraries.
IBM z/OS must not have Inaccessible APF libraries defined.
IBM z/OS inapplicable PPT entries must be invalidated.
The Juniper router must be configured to have all nonessential capabilities disabled.
Kubernetes Controller Manager must disable profiling.
Unused database components that are integrated in MongoDB and cannot be uninstalled must be disabled.
The Exchange Internet Message Access Protocol 4 (IMAP4) service must be disabled.
The Exchange Post Office Protocol 3 (POP3) service must be disabled.
Exchange must not send customer experience reports to Microsoft.
The Java permissions must be disallowed (Internet zone).
Functionality to drag and drop or copy and paste files must be disallowed (Internet zone).
Launching programs and files in IFRAME must be disallowed (Internet zone).
Clipboard operations via script must be disallowed (Internet zone).
Java permissions must be configured with High Safety (Intranet zone).
Java permissions must be configured with High Safety (Trusted Sites zone).
Run once selection for running outdated ActiveX controls must be disabled.
Enabling outdated ActiveX controls for Internet Explorer must be blocked.
Use of the Tabular Data Control (TDC) ActiveX control must be disabled for the Internet Zone.
Use of the Tabular Data Control (TDC) ActiveX control must be disabled for the Restricted Sites Zone.
File downloads must be disallowed (Restricted Sites zone).
Java permissions must be disallowed (Restricted Sites zone).
Functionality to drag and drop or copy and paste files must be disallowed (Restricted Sites zone).
Launching programs and files in IFRAME must be disallowed (Restricted Sites zone).
Active scripting must be disallowed (Restricted Sites Zone).
Clipboard operations via script must be disallowed (Restricted Sites zone).
Internet Explorer must be set to disallow users to add/delete sites.
Script-initiated windows without size or position constraints must be disallowed (Internet zone).
Script-initiated windows without size or position constraints must be disallowed (Restricted Sites zone).
Scriptlets must be disallowed (Internet zone).
Automatic prompting for file downloads must be disallowed (Internet zone).
Java permissions must be disallowed (Local Machine zone).
Java permissions must be disallowed (Locked Down Local Machine zone).
Java permissions must be disallowed (Locked Down Intranet zone).
Java permissions must be disallowed (Locked Down Trusted Sites zone).
Java permissions must be disallowed (Locked Down Restricted Sites zone).
Pop-up Blocker must be enforced (Internet zone).
Pop-up Blocker must be enforced (Restricted Sites zone).
Allow binary and script behaviors must be disallowed (Restricted Sites zone).
Automatic prompting for file downloads must be disallowed (Restricted Sites zone).
Internet Explorer Processes for MK protocol must be enforced (Reserved).
Internet Explorer Processes for MK protocol must be enforced (Explorer).
Internet Explorer Processes for MK protocol must be enforced (iexplore).
Internet Explorer Processes for Restrict File Download must be enforced (Reserved).
Internet Explorer Processes for Restrict File Download must be enforced (Explorer).
Internet Explorer Processes for Restrict File Download must be enforced (iexplore).
Internet Explorer Processes for restricting pop-up windows must be enforced (Reserved).
Internet Explorer Processes for restricting pop-up windows must be enforced (Explorer).
Internet Explorer Processes for restricting pop-up windows must be enforced (iexplore).
Scripting of Java applets must be disallowed (Restricted Sites zone).
AutoComplete feature for forms must be disallowed.
Crash Detection management must be enforced.
Turn on the auto-complete feature for user names and passwords on forms must be disabled.
Scripting of Internet Explorer WebBrowser control property must be disallowed (Internet zone).
When uploading files to a server, the local directory path must be excluded (Internet zone).
Internet Explorer Processes for Notification Bars must be enforced (Reserved).
The IIS 10.0 website must have Multipurpose Internet Mail Extensions (MIME) that invoke OS shell programs disabled.
Mappings to unused and vulnerable scripts on the IIS 10.0 website must be removed.
The IIS 10.0 website must have resource mappings set to disable the serving of certain file types.
The IIS 10.0 website must have Web Distributed Authoring and Versioning (WebDAV) disabled.
Interactive scripts on the IIS 10.0 web server must be located in unique and designated folders.
Interactive scripts on the IIS 10.0 web server must have restrictive access controls.
Backup interactive scripts on the IIS 10.0 server must be removed.
VBA Macros not digitally signed must be blocked in Access.
The Office client must be prevented from polling the SharePoint Server for published links.
VBA Macros not digitally signed must be blocked in Excel.
Internet Explorer Processes for Notification Bars must be enforced (Explorer).
Internet Explorer Processes for Notification Bars must be enforced (iexplore).
Cross-Site Scripting Filter must be enforced (Internet zone).
Scripting of Internet Explorer WebBrowser Control must be disallowed (Restricted Sites zone).
When uploading files to a server, the local directory path must be excluded (Restricted Sites zone).
Cross-Site Scripting Filter property must be enforced (Restricted Sites zone).
Status bar updates via script must be disallowed (Internet zone).
Scriptlets must be disallowed (Restricted Sites zone).
Status bar updates via script must be disallowed (Restricted Sites zone).
The IIS 10.0 web server must not perform user management for hosted applications.
The IIS 10.0 web server must only contain functions necessary for operation.
The IIS 10.0 web server must not be both a website server and a proxy server.
All IIS 10.0 web server sample code, example applications, and tutorials must be removed from a production IIS 10.0 server.
The accounts created by uninstalled features (i.e., tools, utilities, specific, etc.) must be deleted from the IIS 10.0 server.
The IIS 10.0 web server must be reviewed on a regular basis to remove any Operating System features, utility programs, plug-ins, and modules not necessary for operation.
The IIS 10.0 web server must have Multipurpose Internet Mail Extensions (MIME) that invoke OS shell programs disabled.
The IIS 10.0 web server must have Web Distributed Authoring and Versioning (WebDAV) disabled.
An IIS Server configured to be a SMTP relay must require authentication.
Only authorized user accounts must be allowed to create or run virtual machines on Windows 10 systems.
VBA Macros not digitally signed must be blocked in Project.
VBA Macros not digitally signed must be blocked in PowerPoint.
VBA Macros not digitally signed must be blocked in Visio.
VBA Macros not digitally signed must be blocked in Word.
Access to CLR code must be disabled or restricted, unless specifically required and approved.
Access to Non-Standard extended stored procedures must be disabled or restricted, unless specifically required and approved.
Access to linked servers must be disabled or restricted, unless specifically required and approved.
SQL Server default account [sa] must have its name changed.
SQL Server execute permissions to access the registry must be revoked, unless specifically required and approved.
Filestream must be disabled, unless specifically required and approved.
Ole Automation Procedures feature must be disabled, unless specifically required and approved.
SQL Server User Options feature must be disabled, unless specifically required and approved.
Remote Access feature must be disabled, unless specifically required and approved.
Hadoop Connectivity feature must be disabled, unless specifically required and approved.
Allow Polybase Export feature must be disabled, unless specifically required and approved.
Remote Data Archive feature must be disabled, unless specifically required and approved.
SQL Server External Scripts Enabled feature must be disabled, unless specifically required and approved.
SQL Server Replication Xps feature must be disabled, unless specifically required and approved.
Internet Information System (IIS) or its subcomponents must not be installed on a workstation.
Simple TCP/IP Services must not be installed on the system.
The Windows PowerShell 2.0 feature must be disabled on the system.
The Server Message Block (SMB) v1 protocol must be disabled on the system.
The Server Message Block (SMB) v1 protocol must be disabled on the SMB server.
The Server Message Block (SMB) v1 protocol must be disabled on the SMB client.
The Secondary Logon service must be disabled on Windows 10.
Bluetooth must be turned off unless approved by the organization.
Bluetooth must be turned off when not in use.
Camera access from the lock screen must be disabled.
Windows 10 must cover or disable the built-in or attached camera when not in use.
The display of slide shows on the lock screen must be disabled.
WDigest Authentication must be disabled.
Run as different user must be removed from context menus.
Internet connection sharing must be disabled.
Downloading print driver packages over HTTP must be prevented.
Web publishing and online ordering wizards must be prevented from downloading a list of providers.
Printing over HTTP must be prevented.
The network selection user interface (UI) must not be displayed on the logon screen.
Local users on domain-joined computers must not be enumerated.
The Application Compatibility Program Inventory must be prevented from collecting data and sending the information to Microsoft.
Microsoft consumer experiences must be turned off.
The Windows Defender SmartScreen for Explorer must be enabled.
Windows 10 must be configured to disable Windows Game Recording and Broadcasting.
Basic authentication for RSS feeds over HTTP must not be used.
Indexing of encrypted files must be turned off.
The convenience PIN for Windows 10 must be disabled.
Windows Ink Workspace must be configured to disallow access above the lock.
Windows 10 should be configured to prevent users from receiving suggestions for third-party or additional applications.
Toast notifications to the lock screen must be turned off.
Windows 10 must not have portproxy enabled or in use.
The Secondary Logon service must be disabled on Windows 11.
Windows 11 must cover or disable the built-in or attached camera when not in use.
The Microsoft Defender SmartScreen for Explorer must be enabled.
Windows 11 must be configured to disable Windows Game Recording and Broadcasting.
The convenience PIN for Windows 11 must be disabled.
Windows 11 must be configured to prevent users from receiving suggestions for third-party or additional applications.
Windows 11 must not have portproxy enabled or in use.
The roles and features required by the system must be documented.
The Fax Server role must not be installed.
The Peer Name Resolution Protocol must not be installed.
Simple TCP/IP Services must not be installed.
The TFTP Client must not be installed.
The Server Message Block (SMB) v1 protocol must be uninstalled.
Windows PowerShell 2.0 must not be installed.
WDigest Authentication must be disabled on Windows Server 2016.
Windows Server 2016 Windows SmartScreen must be enabled.
Domain controllers must run on a machine dedicated to that function.
Windows Server 2019 must have the roles and features required by the system documented.
Windows Server 2019 must not have the Fax Server role installed.
Windows Server 2019 must not have the Peer Name Resolution Protocol installed.
Windows Server 2019 must not have Simple TCP/IP Services installed.
Windows Server 2019 must not have the TFTP Client installed.
Windows Server 2019 must not have the Server Message Block (SMB) v1 protocol installed.
Windows Server 2019 must have the Server Message Block (SMB) v1 protocol disabled on the SMB server.
Windows Server 2019 must have the Server Message Block (SMB) v1 protocol disabled on the SMB client.
Windows Server 2019 must not have Windows PowerShell 2.0 installed.
Windows Server 2019 must prevent the display of slide shows on the lock screen.
Windows Server 2019 must have WDigest Authentication disabled.
Windows Server 2019 downloading print driver packages over HTTP must be turned off.
Windows Server 2019 printing over HTTP must be turned off.
Windows Server 2019 network selection user interface (UI) must not be displayed on the logon screen.
Windows Server 2019 Application Compatibility Program Inventory must be prevented from collecting data and sending the information to Microsoft.
Windows Server 2019 Windows Defender SmartScreen must be enabled.
Windows Server 2019 must disable Basic authentication for RSS feeds over HTTP.
Windows Server 2019 must prevent Indexing of encrypted files.
Windows Server 2019 domain controllers must run on a machine dedicated to that function.
Windows Server 2019 local users on domain-joined member servers must not be enumerated.
Windows Server 2022 must have the roles and features required by the system documented.
Windows Server 2022 must not have the Fax Server role installed.
Windows Server 2022 must not have the Peer Name Resolution Protocol installed.
Windows Server 2022 must not have Simple TCP/IP Services installed.
Windows Server 2022 must not have the TFTP Client installed.
Windows Server 2022 must not the Server Message Block (SMB) v1 protocol installed.
Windows Server 2022 must have the Server Message Block (SMB) v1 protocol disabled on the SMB server.
Windows Server 2022 must have the Server Message Block (SMB) v1 protocol disabled on the SMB client.
Windows Server 2022 must not have Windows PowerShell 2.0 installed.
Windows Server 2022 must prevent the display of slide shows on the lock screen.
Windows Server 2022 must have WDigest Authentication disabled.
Windows Server 2022 downloading print driver packages over HTTP must be turned off.
Windows Server 2022 printing over HTTP must be turned off.
Windows Server 2022 network selection user interface (UI) must not be displayed on the logon screen.
Windows Server 2022 Application Compatibility Program Inventory must be prevented from collecting data and sending the information to Microsoft.
Windows Server 2022 Microsoft Defender antivirus SmartScreen must be enabled.
Windows Server 2022 must disable Basic authentication for RSS feeds over HTTP.
Windows Server 2022 must prevent Indexing of encrypted files.
Windows Server 2022 domain controllers must run on a machine dedicated to that function.
Windows Server 2022 local users on domain-joined member servers must not be enumerated.
Use of external executables must be authorized.
OS accounts utilized to run external procedures called by the DBMS must have limited privileges.
Use of external executables must be authorized.
The Oracle Linux operating system must not have the rsh-server package installed.
The Oracle Linux operating system must not have the ypserv package installed.
The Oracle Linux operating system must not have the telnet-server package installed.
OL 8 must disable the chrony daemon from acting as a server.
OL 8 must disable network management of the chrony daemon.
OL 8 must not have the telnet-server package installed.
OL 8 must not have any automated bug reporting tools installed.
OL 8 must not have the sendmail package installed.
OL 8 must enable mitigations against processor-based vulnerabilities.
OL 8 must not have the rsh-server package installed.
OL 8 must cover or disable the built-in or attached camera when not in use.
OL 8 must disable the transparent inter-process communication (TIPC) protocol.
OL 8 must disable mounting of cramfs.
OL 8 must disable IEEE 1394 (FireWire) Support.
Unused database components, MySQL Database Server 8.0 software, and database objects must be removed.
Unused database components which are integrated in the MySQL Database Server 8.0 and cannot be uninstalled must be disabled.
The Palo Alto Networks security platform must only enable User-ID on trusted zones.
The Palo Alto Networks security platform must disable WMI probing if it is not used.
The Palo Alto Networks security platform must not enable the DNS proxy.
Unused database components which are integrated in PostgreSQL and cannot be uninstalled must be disabled.
Unused database components that are integrated in Redis Enterprise DBMS and cannot be uninstalled must be disabled.
Rancher RKE2 must be configured with only essential configurations.
OpenShift must contain only container images for those capabilities being offered by the container platform.
Red Hat Enterprise Linux CoreOS (RHCOS) must disable SSHD service.
Red Hat Enterprise Linux CoreOS (RHCOS) must disable USB Storage kernel module.
Red Hat Enterprise Linux CoreOS (RHCOS) must use USBGuard for hosts that include a USB Controller.
All Automation Controller NGINX front-end web servers must not perform user management for hosted applications.
All Automation Controller NGINX web servers must not be a proxy server for any process other than the Automation Controller application.
All Automation Controller NGINX webserver accounts not utilized by installed features (i.e., tools, utilities, specific services, etc.) must not be created and must be deleted when the web server feature is uninstalled.
All Automation Controller NGINX web servers must have Multipurpose Internet Mail Extensions (MIME) that invoke OS shell programs disabled.
All Automation Controller NGINX web servers must have Web Distributed Authoring (WebDAV) disabled.
All Automation Controller NGINX web servers must protect system resources and privileged operations from hosted applications.
The Red Hat Enterprise Linux operating system must not have the rsh-server package installed.
The Red Hat Enterprise Linux operating system must not have the ypserv package installed.
The Red Hat Enterprise Linux operating system must not have the telnet-server package installed.
RHEL 8 must disable the chrony daemon from acting as a server.
RHEL 8 must disable network management of the chrony daemon.
RHEL 8 must not have the telnet-server package installed.
RHEL 8 must not have any automated bug reporting tools installed.
RHEL 8 must not have the sendmail package installed.
RHEL 8 must enable mitigations against processor-based vulnerabilities.
RHEL 8 must not have the rsh-server package installed.
RHEL 8 must cover or disable the built-in or attached camera when not in use.
RHEL 8 must disable the asynchronous transfer mode (ATM) protocol.
RHEL 8 must disable the controller area network (CAN) protocol.
RHEL 8 must disable the stream control transmission protocol (SCTP).
RHEL 8 must disable the transparent inter-process communication (TIPC) protocol.
RHEL 8 must disable mounting of cramfs.
RHEL 8 must disable IEEE 1394 (FireWire) Support.
The gssproxy package must not be installed unless mission essential on RHEL 8.
RHEL 9 must enable mitigations against processor-based vulnerabilities.
RHEL 9 must be configured to disable the Asynchronous Transfer Mode kernel module.
RHEL 9 must be configured to disable the Controller Area Network kernel module.
RHEL 9 must be configured to disable the FireWire kernel module.
RHEL 9 must disable the Stream Control Transmission Protocol (SCTP) kernel module.
RHEL 9 must disable the Transparent Inter Process Communication (TIPC) kernel module.
RHEL 9 must not have a File Transfer Protocol (FTP) server package installed.
RHEL 9 must not have the sendmail package installed.
RHEL 9 must not have the nfs-utils package installed.
RHEL 9 must not have the ypserv package installed.
RHEL 9 must not have the rsh-server package installed.
RHEL 9 must not have the telnet-server package installed.
RHEL 9 must not have the gssproxy package installed.
RHEL 9 must not have the iprutils package installed.
RHEL 9 must not have the tuned package installed.
RHEL 9 must disable mounting of cramfs.
RHEL 9 must disable the chrony daemon from acting as a server.
RHEL 9 must disable network management of the chrony daemon.
The SUSE operating system must not have the telnet-server package installed.
The SUSE operating system must not have the vsftpd package installed if not required for operational support.
RHEL 9 Bluetooth must be disabled.
The SUSE operating system must not have the vsftpd package installed if not required for operational support.
The SUSE operating system must not have the telnet-server package installed.
The operating system must be configured to provide essential capabilities.
The VMM must be configured to disable non-essential capabilities.
Samsung Android must be configured to disable all Bluetooth profiles except for HSP (Headset Profile), HFP (Hands-Free Profile), SPP (Serial Port Profile), A2DP (Advanced Audio Distribution Profile), AVRCP (Audio/Video Remote Control Profile), and PBAP (Phone Book Access Profile).
The ESXi host must disable the Managed Object Browser (MOB).
The ESXi host must be configured to disable nonessential capabilities by disabling Secure Shell (SSH).
The ESXi host must disable ESXi Shell unless needed for diagnostics or troubleshooting.
VAMI must only load allowed server modules.
VAMI must have Multipurpose Internet Mail Extensions (MIME) that invoke operating system shell programs disabled.
VAMI must explicitly disable Multipurpose Internet Mail Extensions (MIME) mime mappings based on "Content-Type".
VAMI must remove all mappings to unused scripts.
VAMI must have resource mappings set to disable the serving of certain file types.
VAMI must not have the Web Distributed Authoring (WebDAV) servlet installed.
VAMI must prevent hosted applications from exhausting system resources.
Performance Charts must not be configured with unsupported realms.
Performance Charts must be configured to limit access to internal packages.
Performance Charts must have Multipurpose Internet Mail Extensions (MIMEs) that invoke operating system shell programs disabled.
Performance Charts must have mappings set for Java servlet pages.
Performance Charts must not have the Web Distributed Authoring (WebDAV) servlet installed.
Performance Charts must be configured with memory leak protection.
Performance Charts must not have any symbolic links in the web content directory tree.
vCenter Server plugins must be verified.
ESX Agent Manager must only run one webapp.
ESX Agent Manager must not be configured with unsupported realms.
ESX Agent Manager must be configured to limit access to internal packages.
ESX Agent Manager must have Multipurpose Internet Mail Extensions (MIMEs) that invoke operating system shell programs disabled.
ESX Agent Manager must have mappings set for Java servlet pages.
ESX Agent Manager must not have the Web Distributed Authoring (WebDAV) servlet installed.
ESX Agent Manager must be configured with memory leak protection.
ESX Agent Manager must not have any symbolic links in the web content directory tree.
Lookup Service must not be configured with the "UserDatabaseRealm" enabled.
Lookup Service must be configured to limit access to internal packages.
Lookup Service must have Multipurpose Internet Mail Extensions (MIMEs) that invoke operating system shell programs disabled.
Lookup Service must have mappings set for Java servlet pages.
Lookup Service must not have the Web Distributed Authoring (WebDAV) servlet installed.
Lookup Service must be configured with memory leak protection.
Lookup Service must not have any symbolic links in the web content directory tree.
The ESXi host must be configured to disable nonessential capabilities by disabling the Managed Object Browser (MOB).
The ESXi host must be configured to disable nonessential capabilities by disabling the ESXi shell.
The vCenter ESX Agent Manager service must disable stack tracing.
The Security Token Service must only run one webapp.
The Security Token Service must not be configured with unused realms.
The Security Token Service must be configured to limit access to internal packages.
The Security Token Service must have Multipurpose Internet Mail Extensions (MIME) that invoke operating system shell programs disabled.
The Security Token Service must have mappings set for Java servlet pages.
The Security Token Service must not have the Web Distributed Authoring (WebDAV) servlet installed.
The Security Token Service must be configured with memory leak protection.
The Security Token Service must not have any symbolic links in the web content directory tree.
The vCenter ESX Agent Manager service shutdown port must be disabled.
The vCenter ESX Agent Manager service debug parameter must be disabled.
The vCenter ESX Agent Manager service directory listings parameter must be disabled.
The vCenter ESX Agent Manager service deployXML attribute must be disabled.
The vCenter ESX Agent Manager service must have Autodeploy disabled.
The vCenter ESX Agent Manager service xpoweredBy attribute must be disabled.
The vCenter ESX Agent Manager service example applications must be removed.
The vCenter ESX Agent Manager service default ROOT web application must be removed.
The vCenter ESX Agent Manager service default documentation must be removed.
The vCenter ESX Agent Manager service manager webapp must be removed.
The vCenter ESX Agent Manager service host-manager webapp must be removed.
The vCenter Lookup service must disable stack tracing.
The vCenter Lookup service shutdown port must be disabled.
The vCenter Lookup service debug parameter must be disabled.
The vCenter Lookup service directory listings parameter must be disabled.
The vCenter Lookup service deployXML attribute must be disabled.
The vCenter Lookup service must have Autodeploy disabled.
The vCenter Lookup service xpoweredBy attribute must be disabled.
The vCenter Lookup service example applications must be removed.
The vCenter Lookup service default ROOT web application must be removed.
The vCenter Lookup service default documentation must be removed.
The vCenter Lookup service manager webapp must be removed.
The vCenter Lookup service host-manager webapp must be removed.
vSphere UI must not be configured with the "UserDatabaseRealm" enabled.
vSphere UI must be configured to limit access to internal packages.
vSphere UI must have Multipurpose Internet Mail Extensions (MIME) that invoke operating system shell programs disabled.
vSphere UI must have mappings set for Java servlet pages.
vSphere UI must not have the Web Distributed Authoring (WebDAV) servlet installed.
vSphere UI must be configured with memory leak protection.
vSphere UI must not have any symbolic links in the web content directory tree.
The vCenter Perfcharts service must disable stack tracing.
The vCenter Perfcharts service shutdown port must be disabled.
The vCenter Perfcharts service debug parameter must be disabled.
The vCenter Perfcharts service directory listings parameter must be disabled.
The vCenter Perfcharts service deployXML attribute must be disabled.
The vCenter Perfcharts service must have Autodeploy disabled.
The vCenter Perfcharts service xpoweredBy attribute must be disabled.
The vCenter Perfcharts service example applications must be removed.
The vCenter Perfcharts service default documentation must be removed.
The vCenter Perfcharts service manager webapp must be removed.
The vCenter Perfcharts service host-manager webapp must be removed.
The Photon operating system must disable unnecessary kernel modules.
The vCenter PostgreSQL service must not load unused database components, software, and database objects.
The vCenter STS service must disable stack tracing.
The vCenter STS service shutdown port must be disabled.
The vCenter STS service debug parameter must be disabled.
The vCenter STS service directory listings parameter must be disabled.
The vCenter STS service must have Autodeploy disabled.
The vCenter STS service xpoweredBy attribute must be disabled.
The vCenter STS service example applications must be removed.
The vCenter STS service default ROOT web application must be removed.
The vCenter STS service default documentation must be removed.
The vCenter STS service manager webapp must be removed.
The vCenter STS service host-manager webapp must be removed.
The vCenter UI service must disable stack tracing.
The vCenter UI service shutdown port must be disabled.
The vCenter UI service debug parameter must be disabled.
The vCenter UI service directory listings parameter must be disabled.
The vCenter UI service deployXML attribute must be disabled.
The vCenter UI service must have Autodeploy disabled.
The vCenter UI service xpoweredBy attribute must be disabled.
The vCenter UI service example applications must be removed.
The vCenter UI service default ROOT web application must be removed.
The vCenter UI service default documentation must be removed.
The vCenter UI service manager webapp must be removed.
The vCenter UI service host-manager webapp must be removed.
The vCenter VAMI service must explicitly disable Multipurpose Internet Mail Extensions (MIME) mime mappings based on "Content-Type".
The vCenter VAMI service must have resource mappings set to disable the serving of certain file types.
The vCenter VAMI service must have Web Distributed Authoring (WebDAV) disabled.
The vCenter VAMI service must protect system resources and privileged operations from hosted applications.
The web server must not perform user management for hosted applications.
The web server must only contain services and functions necessary for operation.
The web server must not be a proxy server.
The web server must provide install options to exclude the installation of documentation, sample code, example applications, and tutorials.
Web server accounts not utilized by installed features (i.e., tools, utilities, specific services, etc.) must not be created and must be deleted when the web server feature is uninstalled.
The web server must provide install options to exclude installation of utility programs, services, plug-ins, and modules not necessary for operation.
The web server must have Multipurpose Internet Mail Extensions (MIME) that invoke OS shell programs disabled.
The web server must allow the mappings to unused and vulnerable scripts to be removed.
The web server must have resource mappings set to disable the serving of certain file types.
The web server must have Web Distributed Authoring (WebDAV) disabled.
The web server must protect system resources and privileged operations from hosted applications.
Users and scripts running on behalf of users must be contained to the document root or home directory tree of the web server.
Zebra Android 11 must be configured to disable trust agents.
Zebra Android 11 must be configured to disable developer modes.
Zebra Android 11 must be configured to disable USB mass storage mode.
Zebra Android 11 must allow only the Administrator (EMM) to perform the following management function: Enable/disable location services.
The BIG-IP Core implementation must be configured so that only functions, ports, protocols, and/or services that are documented for the server/application for which the virtual servers are providing connectivity.
The BIG-IP Core implementation must be configured to remove or disable any functions, ports, protocols, and/or services that are not documented as required.
The macOS system must disable iCloud storage setup during Setup Assistant.
The macOS system must disable iCloud Keychain Sync.
The macOS system must disable iCloud Document Sync.
The macOS system must disable Bluetooth Sharing.
The macOS system must disable AppleID and internet Account Modification.
The macOS system must disable Content Caching service.
The macOS system must disable iCloud Desktop and Document folder sync.
The macOS system must disable Personalized Advertising.
The macOS system must enforce On Device Dictation.
The macOS system must disable Dictation.
The macOS system must disable the Bluetooth System Settings pane.
The macOS system must disable the TouchID prompt during Setup Assistant.
The macOS system must disable the Screen Time prompt during Setup Assistant.
The macOS system must disable Genmoji.
The macOS system must disable Apple Intelligence Image Generation.
The macOS system must disable Apple Intelligence Writing Tools.
The macOS system must disable sending audio recordings and transcripts to Apple.
The macOS system must disable sending search data from Spotlight to Apple.
Ubuntu 22.04 LTS must not have the "rsh-server" package installed.
The Enterprise Voice, Video, and Messaging Endpoint must be configured to disable or remove nonessential capabilities.
The F5 BIG-IP appliance must be configured to prohibit or restrict the use of unnecessary or prohibited functions, ports, protocols, and/or services, including those defined in the PPSM CAL and vulnerability assessments.
The Enterprise Voice, Video, and Messaging Session Manager must be configured to disable nonessential capabilities.
Google Android 15 must be configured to disable developer modes.
Google Android 15 must be configured to disable all Bluetooth profiles except for HSP (Headset Profile), HFP (Hands-Free Profile), SPP (Serial Port Profile), A2DP (Advanced Audio Distribution Profile), AVRCP (Audio/Video Remote Control Profile), and PBAP (Phone Book Access Profile).
User-managed resources must be created in dedicated namespaces.
MSR's self-signed certificates must be replaced with DOD trusted, signed certificates.
Allowing users and administrators to schedule containers on all nodes must be disabled.
MKE telemetry must be disabled.
MSR telemetry must be disabled.
For MKE's deployed on an Ubuntu host operating system, the AppArmor profile must be enabled.
If MKE is deployed on a Red Hat or CentOS system, SELinux security must be enabled.
The Docker socket must not be mounted inside any containers.
Linux Kernel capabilities must be restricted within containers.
Incoming container traffic must be bound to a specific host interface.
CPU priority must be set appropriately on all containers.
MKE's self-signed certificates must be replaced with DOD trusted, signed certificates.
The "Create repository on push" option in MSR must be disabled.
AutoplayAllowed must be set to disabled.
A website's ability to query for payment methods must be disabled.
Suggestions of similar web pages in the event of a navigation error must be disabled.
User feedback must be disabled.
Relaunch notification must be required.
Visual Search must be disabled.
Copilot must be disabled.
FriendlyURLs must be disabled.
The Request Smuggling filter must be enabled.
SLEM 5 must not have the telnet-server package installed.
The SMS must be configured to remove or disable nonessential capabilities on SMS and TPS, which are not required for operation or not related to IDPS functionality.
TOSS must not have the rsh-server package installed.
TOSS must cover or disable the built-in or attached camera when not in use.
TOSS must disable IEEE 1394 (FireWire) Support.
TOSS must disable mounting of cramfs.
TOSS must disable network management of the chrony daemon.
TOSS must disable the asynchronous transfer mode (ATM) protocol.
TOSS must disable the controller area network (CAN) protocol.
TOSS must disable the stream control transmission (SCTP) protocol.
TOSS must disable the transparent inter-process communication (TIPC) protocol.
TOSS must not have any automated bug reporting tools installed.
TOSS must not have the sendmail package installed.
TOSS must not have the telnet-server package installed.
The NSX Tier-0 Gateway router must be configured to have the Dynamic Host Configuration Protocol (DHCP) service disabled if not in use.
The NSX Tier-0 Gateway router must be configured to have routing protocols disabled if not in use.
The NSX Tier-0 Gateway router must be configured to have multicast disabled if not in use.
The NSX Tier-1 Gateway router must be configured to have the DHCP service disabled if not in use.
The NSX Tier-1 Gateway router must be configured to have multicast disabled if not in use.
The vCenter STS service deployXML attribute must be disabled.
Apple iOS/iPadOS 18 must implement the management setting: not allow automatic completion of Safari browser passcodes.
Apple iOS/iPadOS 18 must implement the management setting: encrypt backups/Encrypt local backup.
Apple iOS/iPadOS 18 must implement the management setting: not allow use of Handoff.
Apple iOS/iPadOS 18 must implement the management setting: not allow use of iPhone widgets on Mac.
Apple iOS/iPadOS 18 must implement the management setting: force Apple Watch wrist detection.
Apple iOS/iPadOS 18 users must complete required training.