Verify that All World-Writable Directories Have Sticky Bits Set
Restrict Access to Kernel Message Buffer
Disallow kernel profiling by unprivileged users
Apple iOS/iPadOS 15 must not allow backup to remote systems (iCloud).
Apple iOS/iPadOS 15 must not allow backup to remote systems (iCloud document and data synchronization).
Apple iOS/iPadOS 15 must not allow backup to remote systems (iCloud Keychain).
Apple iOS/iPadOS 15 must not allow backup to remote systems (My Photo Stream).
Apple iOS/iPadOS 15 must not allow backup to remote systems (iCloud Photo Sharing, also known as Shared Photo Streams).
Apple iOS/iPadOS 15 must not allow backup to remote systems (managed applications data stored in iCloud).
Apple iOS/iPadOS 15 must not allow backup to remote systems (enterprise books).
Apple iOS/iPadOS 15 must be configured to not allow backup of [all applications, configuration data] to locally connected systems.
Applications must prevent unauthorized and unintended information transfer via shared system resources.
A BIND 9.x server implementation must be running in a chroot(ed) directory structure.
IDMS must prevent unauthorized and unintended information transfer via database buffers.
A policy set using the built-in role-based access control (RBAC) capabilities in the Universal Control Plane (UCP) component of Docker Enterprise must be configured.
A policy set using the built-in role-based access control (RBAC) capabilities in the Docker Trusted Registry (DTR) component of Docker Enterprise must be set.
The DNS server implementation must prevent unauthorized and unintended information transfer via shared system resources.
Google Android 13 must be configured to not allow backup of [all applications, configuration data] to locally connected systems.
Google Android 13 must be configured to not allow backup of [all applications, configuration data] to remote systems.
Google Android 13 must allow only the Administrator (MDM) to perform the following management function: Disable Phone Hub.
Google Android 12 must be configured to not allow backup of [all applications, configuration data] to locally connected systems.
Google Android 12 must be configured to not allow backup of [all applications, configuration data] to remote systems.
Database contents must be protected from unauthorized and unintended information transfer by enforcement of a data-transfer policy.
Access to database files must be limited to relevant processes and to authorized, administrative users.
The IBM z/VM SYSTEM CONFIG file must be configured to clear TDISK on IPL.
Microsoft Android 11 must be configured to not allow backup of [all applications, configuration data] to locally connected systems.
Microsoft Android 11 must be configured to not allow backup of all applications and configuration data to remote systems.
Azure SQL Database contents must be protected from unauthorized and unintended information transfer by enforcement of a data-transfer policy.
Nutanix AOS must be configured to restrict public directories.
Prisma Cloud Compute must prevent unauthorized and unintended information transfer.
Samsung Android must be configured to not allow backup of all applications and configuration data to remote systems.
- Disable Backup Services.
Samsung Android must be configured to not allow backup of all applications and configuration data to locally connected systems.
Samsung Android must be configured to not allow backup of all applications, configuration data to remote systems.
- Disable Data Sync Framework.
Samsung Android's Work profile must be configured to not allow backup of all applications, configuration data to remote systems.
- Disable Data Sync Framework.
Apple iOS/iPadOS 16 must be configured to not allow backup of [all applications, configuration data] to locally connected systems.
Apple iOS/iPadOS 17 must be configured to not allow backup of [all applications, configuration data] to locally connected systems.
Apple iOS/iPadOS 17 must not allow backup to remote systems (iCloud).
Apple iOS/iPadOS 16 must not allow backup to remote systems (iCloud).
The Ubuntu operating system must set a sticky bit on all public directories to prevent unauthorized and unintended information transferred via shared system resources.
The Ubuntu operating system must restrict access to the kernel message buffer.
The Ubuntu operating system must set a sticky bit on all public directories to prevent unauthorized and unintended information transferred via shared system resources.
The container platform must prohibit containers from accessing privileged resources.
The container platform must prevent unauthorized and unintended information transfer via shared system resources.
Database contents must be protected from unauthorized and unintended information transfer by enforcement of a data transfer policy.
The DBMS must prevent unauthorized and unintended information transfer via shared system resources.
Google Android 13 must be configured to not allow backup of all work profile applications to remote systems.
Google Android 14 must be configured to not allow backup of [all applications, configuration data] to locally connected systems.
Google Android 14 must be configured to not allow backup of [all applications, configuration data] to remote systems.
Google Android 14 must allow only the administrator (MDM) to perform the following management function: Disable Phone Hub.
Operating systems must prevent unauthorized and unintended information transfer via shared system resources.
ACF2 AUTOERAS GSO record value must be set to indicate that ACF2 is controlling the automatic physical erasure of VSAM or non VSAM data sets.
IBM z/OS sensitive and critical system data sets must not exist on shared DASD.
The CA-TSS AUTOERASE Control Option must be set to ALL for all systems.
The IBM RACF ERASE ALL SETROPTS value must be set to ERASE(ALL) on all systems.
IBM z/OS sensitive and critical system data sets must not exist on shared DASDs.
Access to MarkLogic Server files must be limited to relevant processes and to authorized, administrative users.
MariaDB must prevent unauthorized and unintended information transfer via shared system resources.
MongoDB must prevent unauthorized and unintended information transfer via shared system resources.
Non system-created file shares on a system must limit access to groups that require it.
SQL Server must prevent unauthorized and unintended information transfer via shared system resources.
SQL Server must prevent unauthorized and unintended information transfer via Instant File Initialization (IFI).
Solicited Remote Assistance must not be allowed.
Local drives must be prevented from sharing with Remote Desktop Session Hosts.
Windows 10 Kernel (Direct Memory Access) DMA Protection must be enabled.
Anonymous enumeration of shares must be restricted.
Anonymous access to Named Pipes and Shares must be restricted.
Non-system-created file shares on a system must limit access to groups that require it.
Data files owned by users must be on a different logical partition from the directory server data files.
Anonymous enumeration of shares must not be allowed.
Windows Server 2019 non-system-created file shares must limit access to groups that require it.
Windows Server 2019 Remote Desktop Services must prevent drive redirection.
Windows Server 2019 data files owned by users must be on a different logical partition from the directory server data files.
Windows Server 2019 must not allow anonymous enumeration of shares.
Windows Server 2019 must restrict anonymous access to Named Pipes and Shares.
Windows Server 2022 nonsystem-created file shares must limit access to groups that require it.
Windows Server 2022 Remote Desktop Services must prevent drive redirection.
Windows Server 2022 data files owned by users must be on a different logical partition from the directory server data files.
Windows Server 2022 must not allow anonymous enumeration of shares.
Windows Server 2022 must restrict anonymous access to Named Pipes and Shares.
The DBMS must restrict access to system tables and other configuration information or metadata to DBAs or other authorized users.
DBMS backup and restoration files must be protected from unauthorized access.
The Oracle Linux operating system must restrict access to the kernel message buffer.
A sticky bit must be set on all OL 8 public directories to prevent unauthorized and unintended information transferred via shared system resources.
OL 8 must restrict access to the kernel message buffer.
OL 8 must prevent kernel profiling by unprivileged users.
Redis Enterprise DBMS must prevent unauthorized and unintended information transfer via shared system resources.
Rancher RKE2 runtime must maintain separate execution domains for each container by assigning each container a separate address space to prevent unauthorized and unintended information transfer via shared system resources.
OpenShift must prevent unauthorized and unintended information transfer via shared system resources and enable page poisoning.
OpenShift must disable virtual syscalls.
OpenShift must enable poisoning of SLUB/SLAB objects.
OpenShift must set the sticky bit for world-writable directories.
OpenShift must restrict access to the kernel buffer.
OpenShift must prevent kernel profiling.
Container images instantiated by OpenShift must execute using least privileges.
A sticky bit must be set on all RHEL 8 public directories to prevent unauthorized and unintended information transferred via shared system resources.
RHEL 8 must restrict access to the kernel message buffer.
RHEL 8 must prevent kernel profiling by unprivileged users.
The Red Hat Enterprise Linux operating system must restrict access to the kernel message buffer.
The sticky bit must be set on all SUSE operating system world-writable directories.
RHEL 9 must restrict access to the kernel message buffer.
RHEL 9 must prevent kernel profiling by nonprivileged users.
All RHEL 9 world-writable directories must be owned by root, sys, bin, or an application user.
A sticky bit must be set on all RHEL 9 public directories.
The SUSE operating system must restrict access to the kernel message buffer.
Samsung Android must be configured to not allow backup of all applications and configuration data to remote systems.
Samsung Android must be configured to not allow backup of all applications, configuration data to locally connected systems.
Samsung Android must be configured to not allow backup of all applications, configuration data to remote systems.
- Disable Data Sync Framework
Samsung Android must be configured to not allow backup of all applications' configuration data to locally connected systems.
Samsung Android's Work profile must be configured to not allow backup of [all applications, configuration data] to remote systems.
- Disable Data Sync Framework
The Samsung Android device must be configured to perform the following management function: Disable Phone Hub.
The VMM must prevent unauthorized and unintended information transfer via shared system resources.
The Photon operating system must restrict access to the kernel message buffer.
The macOS system must ensure System Integrity Protection is enabled.
Ubuntu 22.04 LTS must restrict access to the kernel message buffer.
Ubuntu 22.04 LTS must set a sticky bit on all public directories to prevent unauthorized and unintended information transferred via shared system resources.
Google Android 14 must be configured to not allow backup of all work profile applications to remote systems.
Google Android 15 must be configured to not allow backup of [all applications, configuration data] to locally connected systems.
Google Android 15 must be configured to not allow backup of [all applications, configuration data] to remote systems.
Google Android 15 must allow only the administrator (MDM) to perform the following management function: Disable Phone Hub.
All containers must be restricted from acquiring additional privileges.
Host IPC namespace must not be shared.
SLEM 5 must restrict access to the kernel message buffer.
The sticky bit must be set on all SLEM 5 world-writable directories.
Samsung Android must be configured to not allow backup of all applications, configuration data to remote systems.- Disable Data Sync Framework.
Samsung Android's Work profile must be configured to not allow backup of all applications, configuration data to remote systems.- Disable Data Sync Framework.
TOSS must prevent unauthorized and unintended information transfer via shared system resources.
Apple iOS/iPadOS 18 must not allow backup to remote systems (iCloud).
Apple iOS/iPadOS 18 must not allow backup to remote systems (iCloud document and data synchronization).
Apple iOS/iPadOS 18 must not allow backup to remote systems (iCloud Keychain).
Apple iOS/iPadOS 18 must not allow backup to remote systems (Cloud Photo Library).
Apple iOS/iPadOS 18 must not allow backup to remote systems (iCloud Photo Sharing, also known as Shared Stream or Shared Photo Stream).
Apple iOS/iPadOS 18 must not allow backup to remote systems (managed applications data stored in iCloud).
Apple iOS/iPadOS 18 must not allow backup to remote systems (enterprise books).
Apple iOS/iPadOS 18 must be configured to not allow backup of [all applications, configuration data] to locally connected systems.
Apple iOS/iPadOS 18 must disable "Allow USB drive access in Files app" if the authorizing official (AO) has not approved the use of DOD-approved USB storage drives with iOS/iPadOS devices.