Verify that Shared Library Directories Have Root Ownership
Verify that Shared Library Directories Have Restrictive Permissions
Verify that System Executables Have Root Ownership
Verify that Shared Library Files Have Root Ownership
Verify that System Executables Have Restrictive Permissions
Verify that Shared Library Files Have Restrictive Permissions
Verify that Shared Library Directories Have Root Group Ownership
Verify that system commands files are group owned by root or a system account
Verify the system-wide library files in directories
"/lib", "/lib64", "/usr/lib/" and "/usr/lib64" are group-owned by root.
Verify that system commands directories have root as a group owner
Verify that system commands directories have root ownership
Verify that system commands are protected from unauthorized access
OS commands and libraries must have the proper permissions to protect from unauthorized access
Adobe Acrobat Pro DC Continuous Default Handler changes must be disabled.
Adobe Reader DC must disable the ability to change the Default Handler.
The application server must limit privileges to change the software resident within software libraries.
The applications must limit privileges to change the software resident within software libraries.
Database objects in an IDMS environment must be secured to prevent privileged actions from being performed by unauthorized users.
The programs that can be run through a CA IDMS CV must be defined to the CV to prevent installation of unauthorized programs; must have the ability to dynamically register new programs; and must have the ability to secure tasks.
The commands that allow dynamic definitions of PROGRAM/TASK and the dynamic varying of memory must be secured.
Databases must be secured to protect from structural changes.
Database utilities must be secured in CA IDMS and permissions given to appropriate role(s)/groups(s) in the external security manager (ESM).
The online debugger which can change programs and storage in the CA IDMS address space must be secured.
CA IDMS must secure the ability to create, alter, drop, grant, and revoke user and/or system profiles to users or groups.
The FortiGate device must limit privileges to change the software resident within software libraries.
CounterACT must limit privileges to change the software resident within software libraries.
Forescout must limit privileges to change the modules and OSs resident within software libraries.
The DataPower Gateway must limit privileges to change the software resident within software libraries.
DB2 must limit privileges to change software modules, to include stored procedures, functions and triggers, and links to software external to DB2.
The OS must limit privileges to change the DB2 software resident within software libraries (including privileged programs).
The DB2 software installation account must be restricted to authorized users.
Database software, including DBMS configuration files, must be stored in dedicated directories, separate from the host OS and other applications.
Database objects (including but not limited to tables, indexes, storage, stored procedures, functions, triggers, links to software external to DB2, etc.) must be owned by database/DBMS principals authorized for ownership.
The role(s)/group(s) used to modify database structure (including but not necessarily limited to tables, indexes, storage, etc.) and logic modules (stored procedures, functions, triggers, links to software external to DB2, etc.) must be restricted to authorized users.
The WebSphere Liberty Server must protect software libraries from unauthorized access.
The WebSphere Application Server users in a local user registry group must be authorized for that group.
The IBM z/VM must restrict link access to the disk on which system software resides.
mgmt-users.properties file permissions must be set to allow access to authorized users only.
The Juniper router must be configured to limit privileges to change the software resident within software libraries.
The Mainframe Product must limit privileges to change the Mainframe Product installation datasets to system programmers and authorized users in accordance with applicable access control policies.
The Mainframe Product must limit privileges to change Mainframe Product started task and job datasets to system programmers and authorized users in accordance with applicable access control policies.
The Mainframe Product must limit privileges to change Mainframe Product user datasets to authorized individuals.
Database objects (including but not limited to tables, indexes, storage, stored procedures, functions, triggers, links to software external to Azure SQL Database, etc.) must be owned by database/Azure SQL Database principals authorized for ownership.
The role(s)/group(s) used to modify database structure (including but not necessarily limited to tables, indexes, storage, etc.) and logic modules (stored procedures, functions, triggers, links to software external to Azure SQL Database, etc.) must be restricted to authorized users.
SQL Server must be monitored to discover unauthorized changes to functions.
SQL Server must be monitored to discover unauthorized changes to triggers.
SQL Server must be monitored to discover unauthorized changes to stored procedures.
Database objects (including but not limited to tables, indexes, storage, stored procedures, functions, triggers, links to software external to SQL Server, etc.) must be owned by database/DBMS principals authorized for ownership.
In a database owned by a login not having administrative privileges at the instance level, the database property TRUSTWORTHY must be OFF unless required and authorized.
In a database owned by [sa], or by any other login having administrative privileges at the instance level, the database property TRUSTWORTHY must be OFF.
SQL Server security-relevant configuration settings must be monitored to discover unauthorized changes.
Software, applications, and configuration files that are part of, or related to, the SQL Server installation must be monitored to discover unauthorized changes.
SQL Server software installation account(s) must be restricted to authorized users.
Database software directories, including SQL Server configuration files, must be stored in dedicated directories, separate from the host OS and other applications.
The role(s)/group(s) used to modify database structure (including but not necessarily limited to tables, indexes, storage, etc.) and logic modules (stored procedures, functions, triggers, links to software external to SQL Server, etc.) must be restricted to authorized users.
The network device must limit privileges to change the software resident within software libraries.
Oracle WebLogic must limit privileges to change the software resident within software libraries (including privileged programs).
Users requiring access to Prisma Cloud Compute's Credential Store must be assigned and accessed by the appropriate role holders.
Prisma Cloud Compute host compliance baseline policies must be set.
The configuration integrity of the container platform must be ensured and compliance policies must be configured.
All installation files originally downloaded to the Tanium Server must be configured to download to a location other than the Tanium Server directory.
The UEM server must limit privileges to change the software resident within software libraries.
Tomcat user UMASK must be set to 0027.
The macOS system must enable System Integrity Protection.
The macOS system must enable System Integrity Protection.
The macOS system must ensure System Integrity Protection is enabled.
The Ubuntu operating system library files must have mode 0755 or less permissive.
The Ubuntu operating system library directories must have mode 0755 or less permissive.
The Ubuntu operating system library files must be owned by root.
The Ubuntu operating system library directories must be owned by root.
The Ubuntu operating system library files must be group-owned by root.
The Ubuntu operating system library directories must be group-owned by root.
The Ubuntu operating system must have system commands set to a mode of 0755 or less permissive.
The Ubuntu operating system must have directories that contain system commands set to a mode of 0755 or less permissive.
The Ubuntu operating system must have system commands owned by root.
The Ubuntu operating system must have directories that contain system commands owned by root.
The Ubuntu operating system must have system commands group-owned by root or a system account.
The Ubuntu operating system must have directories that contain system commands group-owned by root.
The Ubuntu operating system library files must be group-owned by root or a system account.
The Ubuntu operating system must have system commands owned by root or a system account.
Privileges to change PostgreSQL software modules must be limited.
PostgreSQL must limit privileges to change functions and triggers, and links to software external to PostgreSQL.
The role(s)/group(s) used to modify database structure (including but not necessarily limited to tables, indexes, storage, etc.) and logic modules (functions, trigger procedures, links to software external to PostgreSQL, etc.) must be restricted to authorized users.
Database objects (including but not limited to tables, indexes, storage, trigger procedures, functions, links to software external to PostgreSQL, etc.) must be owned by database/DBMS principals authorized for ownership.
The PostgreSQL software installation account must be restricted to authorized users.
Database software, including PostgreSQL configuration files, must be stored in dedicated directories separate from the host OS and other applications.
The Cisco router must be configured to limit privileges to change the software resident within software libraries.
The Cisco switch must be configured to limit privileges to change the software resident within software libraries.
The container platform must limit privileges to the container platform registry.
The container platform must limit privileges to the container platform runtime.
The container platform must limit privileges to the container platform keystore.
Configuration files for the container platform must be protected.
Authentication files for the container platform must be protected.
Software, applications, and configuration files that are part of, or related to, the EDB Postgres Advanced Server installation must be monitored to discover unauthorized changes.
EDB Postgres Advanced Server software modules, to include stored procedures, functions, and triggers must be monitored to discover unauthorized changes.
The EDB Postgres Advanced Server software installation account must be restricted to authorized users.
Database software, including EDB Postgres Advanced Server configuration files, must be stored in dedicated directories, separate from the host OS and other applications.
Database objects must be owned by database/EDB Postgres Advanced Server principals authorized for ownership.
The role(s)/group(s) used to modify database structure and logic modules must be restricted to authorized users.
The DBMS must limit privileges to change software modules, to include stored procedures, functions and triggers, and links to software external to the DBMS.
The DBMS software installation account must be restricted to authorized users.
Database software, including DBMS configuration files, must be stored in dedicated directories, or DASD pools, separate from the host OS and other applications.
Database objects (including but not limited to tables, indexes, storage, stored procedures, functions, triggers, links to software external to the DBMS, etc.) must be owned by database/DBMS principals authorized for ownership.
The role(s)/group(s) used to modify database structure (including but not necessarily limited to tables, indexes, storage, etc.) and logic modules (stored procedures, functions, triggers, links to software external to the DBMS, etc.) must be restricted to authorized users.
The operating system must limit privileges to change software resident within software libraries.
All system files, programs, and directories must be owned by a system account.
AIX device files and directories must only be writable by users with a system account or as configured by the vendor.
AIX system files, programs, and directories must be group-owned by a system group.
AIX library files must have mode 0755 or less permissive.
All system command files must not have extended ACLs.
All library files must not have extended ACLs.
CA-ACF2 must limit Write or greater access to SYS1.NUCLEUS to system programmers only.
CA-ACF2 must limit Write or greater access to SYS1.LPALIB to system programmers only.
CA-ACF2 must limit Write or greater access to SYS1.IMAGELIB to system programmers.
CA-ACF2 must limit Write or greater access to Libraries containing EXIT modules to system programmers only.
CA-ACF2 must limit Write and Allocate access to all APF-authorized libraries to system programmers only.
CA-ACF2 must limit Write or greater access to all LPA libraries to system programmers only.
CA-ACF2 must limit Write and Allocate access to LINKLIST libraries to system programmers only.
CA-ACF2 must limit Write and allocate access to all system-level product installation libraries to system programmers only.
CA-ACF2 must limit Write or greater access to SYS1.SVCLIB to system programmers only.
CA-ACF2 Access to SYS1.LINKLIB must be properly protected.
IBM z/OS SYS1.PARMLIB must be properly protected.
CA-ACF2 must limit Write and allocate access to the JES2 System data sets (e.g., Spool, Checkpoint, and Initialization parameters) to system programmers only.
CA-ACF2 must limit Write or greater access to libraries that contain PPT modules to system programmers only.
CA-TSS access to SYS1.LINKLIB must be properly protected.
CA-TSS must limit Write or greater access to SYS1.SVCLIB to system programmers only.
CA-TSS must limit Write or greater access to SYS1.IMAGELIB to system programmers only.
CA-TSS must limit Write or greater access to SYS1.LPALIB to system programmers only.
CA-TSS must limit WRITE or greater access to all APF-authorized libraries to system programmers only.
IBM z/OS libraries included in the system REXXLIB concatenation must be properly protected.
CA-TSS must limit Write or greater access to all LPA libraries to system programmers only.
CA-TSS must limit Write or greater access to SYS1.NUCLEUS to system programmers only.
CA-TSS must limit Write or greater access to libraries that contain PPT modules to system programmers only.
CA-TSS must limit WRITE or greater access to LINKLIST libraries to system programmers only.
CA-TSS security data sets and/or databases must be properly protected.
CA-TSS must limit WRITE or greater access to all system-level product installation libraries to system programmers only.
CA-TSS must limit WRITE or greater access to the JES2 System data sets (e.g., Spool, Checkpoint, and Initialization parameters) to system programmers only.
CA-TSS must limit access to SYSTEM DUMP data sets to system programmers only.
ACF2 security data sets and/or databases must be properly protected.
IBM z/OS data sets for the Base TCP/IP component must be properly protected.
IBM z/OS UNIX SYSTEM FILE SECURITY SETTINGS must be properly protected or specified.
IBM z/OS UNIX MVS data sets with z/OS UNIX components must be properly protected.
IBM z/OS UNIX MVS data sets or HFS objects must be properly protected.
IBM z/OS UNIX HFS permission bits and audit bits for each directory must be properly protected.
IBM z/OS UNIX MVS data sets used as step libraries in /etc/steplib must be properly protected.
IBM z/OS UNIX HFS permission bits and audit bits for each directory must be properly protected or specified.
IBM z/OS HFS objects for the z/OS UNIX Telnet Server must be properly protected.
IBM z/OS System data sets used to support the VTAM network must be properly secured.
IBM z/OS VTAM USSTAB definitions must not be used for unsecured terminals.
IBM Integrated Crypto Service Facility (ICSF) STC data sets must be properly protected.
IBM RACF must limit Write or greater access to SYS1.NUCLEUS to system programmers only.
IBM RACF must limit Write or greater access to libraries that contain PPT modules to system programmers only.
IBM RACF must limit Write or greater access to SYS1.IMAGELIB to system programmers only.
IBM RACF must limit Write or greater access to SYS1.SVCLIB to appropriate authorized users.
IBM RACF must limit Write or greater access to SYS1.LPALIB to system programmers only.
IBM RACF must limit write or greater access to all LPA libraries to system programmers only.
IBM RACF must limit Write or greater access to libraries containing EXIT modules to system programmers only.
IBM RACF must limit WRITE or greater access to all system-level product installation libraries to system programmers.
IBM RACF must limit access to SYSTEM DUMP data sets to system programmers only.
IBM RACF must limit WRITE or greater access to all APF-authorized libraries to system programmers only.
IBM RACF access to SYS1.LINKLIB must be properly protected.
The IBM RACF System REXX IRRPWREX security data set must be properly protected.
IBM RACF security data sets and/or databases must be properly protected.
IBM RACF must limit WRITE or greater access to the JES2 System data sets (e.g., Spool, Checkpoint, and Initialization parameters) to system programmers only.
CA-TSS must limit WRITE or greater access to libraries containing EXIT modules to system programmers only.
IBM z/OS UNIX MVS data sets WITH z/OS UNIX COMPONENTS must be properly protected.
IBM z/OS System datasets used to support the VTAM network must be properly secured.
IBM RACF must limit WRITE or greater access to LINKLIST libraries to system programmers only.
IBM z/OS UNIX system file security settings must be properly protected or specified.
IBM z/OS HFS objects for the z/OS UNIX Telnet server must be properly protected.
The ICS must be configured to prevent nonprivileged users from executing privileged functions.
The Juniper EX switch must be configured to limit privileges to change the software resident within software libraries.
Kubernetes Kubelet must deny hostname override.
The Kubernetes manifests must be owned by root.
The Kubernetes KubeletConfiguration file must be owned by root.
The Kubernetes KubeletConfiguration files must have file permissions set to 644 or more restrictive.
The Kubernetes manifest files must have least privileges.
MarkLogic Server must limit privileges to change software modules, including stored procedures, functions, and triggers, and links to software external to the DBMS.
MarkLogic Server software installation account must be restricted to authorized users.
MarkLogic Server software, including configuration files, must be stored in dedicated directories, or DASD pools, separate from the host OS and other applications.
MarkLogic Server objects (including but not limited to indexes, storage, functions, triggers, links to software external to the server, etc.) must be owned by database/MarkLogic Server principals authorized for ownership.
The role(s)/group(s) used to modify database structure (including but not necessarily limited to indexes, storage, etc.) and logic modules (functions, triggers, links to software external to the MarkLogic Server, etc.) must be restricted to authorized users.
MariaDB must limit privileges to change software modules, to include stored procedures, functions and triggers, and links to software external to the DBMS.
The MariaDB software installation account must be restricted to authorized users.
Database software, including MariaDB configuration files, must be stored in dedicated directories, separate from the host OS and other applications.
Database objects (including but not limited to tables, indexes, storage, stored procedures, functions, triggers, links to software external to MariaDB, etc.) must be owned by database/MariaDB principals authorized for ownership.
The role(s)/group(s) used to modify database structure (including but not necessarily limited to tables, indexes, storage, etc.) and logic modules (stored procedures, functions, triggers, links to software external to the MariaDB, etc.) must be restricted to authorized users.
MongoDB software installation account must be restricted to authorized users.
The role(s)/group(s) used to modify database structure (including but not necessarily limited to tables, indexes, storage, etc.) and logic modules (stored procedures, functions, triggers, links to software external to MongoDB, etc.) must be restricted to authorized users.
MongoDB must limit privileges to change software modules, to include stored procedures, functions and triggers, and links to software external to MongoDB.
Database objects (including but not limited to tables, indexes, storage, stored procedures, functions, triggers, links to software external to MongoDB, etc.) must be owned by database/DBMS principals authorized for ownership.
SQL Server must limit privileges to change software modules, to include stored procedures, functions, and triggers.
SQL Server must limit privileges to change software modules, to include stored procedures, functions, and triggers, and links to software external to SQL Server.
SQL Server must limit privileges to change software modules and links to software external to SQL Server.
SQL Server must limit privileges to change software modules, to include stored procedures, functions and triggers, and links to software external to SQL Server.
SQL Server software installation account must be restricted to authorized users.
Database objects must be owned by accounts authorized for ownership.
Database software, applications, and configuration files must be monitored to discover unauthorized changes.
Logic modules within the database (to include packages, procedures, functions and triggers) must be monitored to discover unauthorized changes.
The DBMS software installation account must be restricted to authorized users.
Database software directories, including DBMS configuration files, must be stored in dedicated directories, or DASD pools, separate from the host OS and other applications.
The DBMS must be protected from unauthorized access by developers.
Administrative privileges must be assigned to database accounts via database roles.
The DBMS must verify there have not been unauthorized changes to the DBMS software and information.
Use of the DBMS software installation account must be restricted.
The OS must limit privileges to change the DBMS software resident within software libraries (including privileged programs).
Oracle software must be evaluated and patched against newly found vulnerabilities.
Use of the DBMS software installation account must be restricted.
OL 8 system commands must have mode 755 or less permissive.
OL 8 system commands must be owned by root.
OL 8 system commands must be group-owned by root or a system account.
OL 8 library files must have mode 755 or less permissive.
OL 8 library files must be owned by root.
OL 8 library files must be group-owned by root.
OL 8 library directories must have mode 755 or less permissive.
OL 8 library directories must be owned by root.
OL 8 library directories must be group-owned by root or a system account.
The MySQL Database Server 8.0 must limit privileges to change software modules, to include stored procedures, functions and triggers, and links to software external to the MySQL Database Server 8.0.
The MySQL Database Server 8.0 software installation account must be restricted to authorized users.
Database software, including MySQL Database Server 8.0 configuration files, must be stored in dedicated directories, or DASD pools (remove), separate from the host OS and other applications.
The role(s)/group(s) used to modify database structure (including but not necessarily limited to tables, indexes, storage, etc.) and logic modules (stored procedures, functions, triggers, links to software external to the MySQL Database Server 8.0, etc.) must be restricted to authorized users.
Automation Controller must be capable of reverting to the last known good configuration in the event of failed installations and upgrades.
Redis Enterprise DBMS must limit privileges to change software modules; to include stored procedures, functions, and triggers, and links to software external to Redis Enterprise DBMS.
Redis Enterprise DBMS software installation account must be restricted to authorized users.
The role(s)/group(s) used to modify database structure (including but not necessarily limited to tables, indexes, storage, etc.) and logic modules (stored procedures, functions, triggers, links to software external to Redis Enterprise DBMS, etc.) must be restricted to authorized users.
Configuration and authentication files for Rancher RKE2 must be protected.
OpenShift RBAC access controls must be enforced.
RHEL 8 system commands must have mode 755 or less permissive.
RHEL 8 system commands must be owned by root.
RHEL 8 system commands must be group-owned by root or a system account.
RHEL 8 library files must have mode 755 or less permissive.
RHEL 8 library files must be owned by root.
RHEL 8 library files must be group-owned by root or a system account.
RHEL 8 library directories must have mode 755 or less permissive.
RHEL 8 library directories must be owned by root.
RHEL 8 library directories must be group-owned by root or a system account.
RHEL 9 system commands must have mode 755 or less permissive.
RHEL 9 library directories must have mode 755 or less permissive.
RHEL 9 library files must have mode 755 or less permissive.
RHEL 9 system commands must be owned by root.
RHEL 9 system commands must be group-owned by root or a system account.
RHEL 9 library files must be owned by root.
RHEL 9 library files must be group-owned by root or a system account.
RHEL 9 library directories must be owned by root.
RHEL 9 library directories must be group-owned by root or a system account.
The SUSE operating system library files must have mode 0755 or less permissive.
The SUSE operating system library directories must have mode 0755 or less permissive.
The SUSE operating system library files must be owned by root.
The SUSE operating system library directories must be owned by root.
The SUSE operating system library files must be group-owned by root.
The SUSE operating system library directories must be group-owned by root.
The SUSE operating system must have system commands set to a mode of 755 or less permissive.
The SUSE operating system must have directories that contain system commands set to a mode of 0755 or less permissive.
The SUSE operating system must have system commands owned by root.
The SUSE operating system must have directories that contain system commands owned by root.
The SUSE operating system must have system commands group-owned by root or a system account.
The SUSE operating system must have directories that contain system commands group-owned by root.
The SUSE operating system must have system commands set to a mode of 0755 or less permissive.
The VMM must limit privileges to change software resident within software libraries.
The vCenter ESX Agent Manager service must limit privileges for creating or modifying hosted application shared files.
All vCenter database (VCDB) tables must be owned by the "vc" user account.
VMware Postgres must limit modify privileges to authorized accounts.
The vCenter Lookup service must limit privileges for creating or modifying hosted application shared files.
The vCenter Perfcharts service must limit privileges for creating or modifying hosted application shared files.
BMC CONTROL-D STC data sets must be properly protected.
BMC CONTROL-O STC data sets must be properly protected.
BMC IOA STC data sets must be properly protected.
BMC MAINVIEW for z/OS STC data sets are not properly protected.
CA Auditor User data sets are not properly protected.
CA VTAPE STC data sets will be properly protected.
BMC CONTROL-M STC data sets will be properly protected.
The vCenter STS service must limit privileges for creating or modifying hosted application shared files.
The vCenter UI service must limit privileges for creating or modifying hosted application shared files.
CA-1 Tape Management STC data sets must be properly protected.
CA MIM Resource Sharing STC data sets will be properly protected.
CL/SuperSession STC data sets must be properly protected.
Compuware Abend-AID STC data sets must be properly protected.
IBM Communications Server Simple Mail Transfer Protocol (CSSMTP) STC data sets must be properly protected.
NCP (Net Work Control Program) Data set access authorization does not restricts UPDATE and/or ALLOCATE access to appropriate personnel.
IBM Hardware Configuration Definition (HCD) User data sets are not properly protected.
CICS system data sets are not properly protected.
ACF2/CICS parameter data sets are not protected in accordance with the proper security requirements.
Quest NC-Pass STC data sets will be properly protected.
Tivoli Asset Discovery for zOS (TADz) STC and/or batch data sets are not properly protected.
WebSphere MQ all update and alter access to MQSeries/WebSphere MQ product and system data sets are not properly restricted.
IBM Health Checker STC data sets will be properly protected.
NetView STC data sets are not properly protected.
SRRAUDIT User data sets are not properly protected.
ROSCOE STC data sets are not properly protected.
Compuware Abend-AID STC data sets will be properly protected.
Software, applications, and configuration files that are part of, or related to, the Postgres Plus Advanced Server installation must be monitored to discover unauthorized changes.
Database objects (including but not limited to tables, indexes, storage, stored procedures, functions, triggers, links to software external to the EDB Postgres Advanced Server, etc.) must be owned by database/EDB Postgres Advanced Server principals authorized for ownership.
The role(s)/group(s) used to modify database structure (including but not necessarily limited to tables, indexes, storage, etc.) and logic modules (stored procedures, functions, triggers, links to software external to the EDB Postgres Advanced Server, etc.) must be restricted to authorized users.
Ubuntu 22.04 LTS must have system commands set to a mode of "755" or less permissive.
Ubuntu 22.04 LTS library files must have mode "755" or less permissive.
Ubuntu 22.04 LTS must have system commands owned by "root" or a system account.
Ubuntu 22.04 LTS must have system commands group-owned by "root" or a system account.
Ubuntu 22.04 LTS library directories must be owned by "root".
Ubuntu 22.04 LTS library directories must be group-owned by "root".
Ubuntu 22.04 LTS library files must be owned by "root".
Ubuntu 22.04 LTS library files must be group-owned by "root".
PostgreSQL must limit privileges to change software modules, to include stored procedures, functions and triggers, and links to software external to PostgreSQL.
Database software, including PostgreSQL configuration files, must be stored in dedicated directories, or DASD pools, separate from the host OS and other applications.
Database objects (including but not limited to tables, indexes, storage, stored procedures, functions, triggers, links to software external to the DBMS, etc.) must be owned by database/PostgreSQL principals authorized for ownership.
The role(s)/group(s) used to modify database structure (including but not necessarily limited to tables, indexes, storage, etc.) and logic modules (stored procedures, functions, triggers, links to software external to PostgreSQL, etc.) must be restricted to authorized users.
Dragos Platforms must limit privileges and not allow the ability to run shell.
Access to zSecure installation data must be properly restricted and logged.
Access to IBM Security zSecure STC data sets must be properly restricted and logged.
IBM Security zSecure access to user data sets must be properly restricted and logged.
In an MSR organization, user permissions and repositories must be configured.
Least privilege access and need to know must be required to access MKE runtime and instantiate container images.
Swarm Secrets or Kubernetes Secrets must be used.
The role(s)/group(s) used to modify database structure (including but not limited to tables, indexes, storage, etc.) and logic modules (stored procedures, functions, triggers, links to software external to MongoDB, etc.) must be restricted to authorized users.
SLEM 5 must have directories that contain system commands set to a mode of 755 or less permissive.
SLEM 5 must have system commands set to a mode of 755 or less permissive.
SLEM 5 library directories must have mode 755 or less permissive.
SLEM 5 library files must have mode 755 or less permissive.
SLEM 5 library files must be owned by root.
SLEM 5 library files must be group-owned by root.
SLEM 5 library directories must be owned by root.
SLEM 5 library directories must be group-owned by root.
SLEM 5 must have system commands owned by root.
SLEM 5 must have system commands group-owned by root or a system account.
SLEM 5 must have directories that contain system commands owned by root.
SLEM 5 must have directories that contain system commands group-owned by root.
TOSS must limit privileges to change software resident within software libraries.
The NSX Manager must assign users/accounts to organization-defined roles configured with approved authorizations.