Add nodev Option to /dev/shm
Add nosuid Option to /dev/shm
Add noexec Option to /dev/shm
Add noexec Option to /tmp
Add nosuid Option to /tmp
Add nodev Option to /var/log/audit
Add noexec Option to /var/log/audit
Add nosuid Option to /var/log/audit
Add nodev Option to /var/log
Add noexec Option to /var/log
Add nosuid Option to /var/log
Add nodev Option to /var/tmp
Add noexec Option to /var/tmp
Add nosuid Option to /var/tmp
Install fapolicyd Package
Enable the File Access Policy Service
Configure Fapolicy Module to Employ a Deny-all, Permit-by-exception Policy to Allow the Execution of Authorized Software Programs.
Ensure AppArmor is installed
Install the pam_apparmor Package
Ensure AppArmor is Active and Configured
The application must prevent program execution in accordance with organization-defined policies regarding software program usage and restrictions, and/or rules authorizing the terms and conditions of software program usage.
A policy set using the built-in role-based access control (RBAC) capabilities in the Universal Control Plane (UCP) component of Docker Enterprise must be configured.
A policy set using the built-in role-based access control (RBAC) capabilities in the Docker Trusted Registry (DTR) component of Docker Enterprise must be set.
Google Android 12 must be configured to enforce an application installation policy by specifying an application allowlist that restricts applications by the following characteristics: [selection: list of digital signatures, cryptographic hash values, names, application version].
Google Android 13 must be configured to enforce an application installation policy by specifying an application allowlist that restricts applications by the following characteristics: [selection: list of digital signatures, cryptographic hash values, names, application version].
Microsoft Android 11 must be configured to enforce an application installation policy by specifying an application allow list that restricts applications by the following characteristics: [selection: list of digital signatures, cryptographic hash values, names, application version].
Pre-release versions of file formats new to Office Products must be blocked.
The opening of pre-release versions of file formats new to Excel 2013 through the Compatibility Pack for Office 2013 and Excel 2013 Converter must be blocked.
The opening of pre-release versions of file formats new to PowerPoint 2013 through the Compatibility Pack for Office 2013 and PowerPoint 2013 Converter must be blocked.
Nutanix AOS must be configured with nodev, nosuid, and noexec options for /dev/shm.
The configuration integrity of the container platform must be ensured and runtime policies must be configured.
Prisma Cloud Compute host compliance baseline policies must be set.
The configuration integrity of the container platform must be ensured and compliance policies must be configured.
The configuration integrity of the container platform must be ensured and vulnerabilities policies must be configured.
Samsung Android must be configured to enforce an application installation policy by specifying an application allowlist that restricts applications by the following characteristics: Names.
Samsung Android's Work profile must be configured to enforce an application installation policy by specifying an application allowlist that restricts applications by the following characteristics: Names.
The Ubuntu operating system must be configured to use AppArmor.
The container platform must prevent component execution in accordance with organization-defined policies regarding software program usage and restrictions, and/or rules authorizing the terms and conditions of software program usage.
Google Android 14 must be configured to enforce an application installation policy by specifying an application allowlist that restricts applications by the following characteristics: [selection: list of digital signatures, cryptographic hash values, names, application version].
The operating system must prevent program execution in accordance with local policies regarding software program usage and restrictions and/or rules authorizing the terms and conditions of software program usage.
AIX must employ a deny-all, permit-by-exception policy to allow the execution of authorized software programs.
ACF2 MAINT GSO record value if specified must be restricted to production storage management user.
ACF2 LINKLST GSO record if specified must only contains trusted system data sets.
The IBM z/OS TFTP Server program must be properly protected.
Unsupported IBM z/OS system software must not be installed and/or active on the system.
IBM z/OS must not allow non-existent or inaccessible LINKLIST libraries.
IBM z/OS must not allow non-existent or inaccessible Link Pack Area (LPA) libraries.
The IBM z/OS TFTP server program must be properly protected.
Unsupported system software must not be installed and/ or active on the system.
IBM z/OS must not allow nonexistent or inaccessible LINKLIST libraries.
IBM z/OS must not allow nonexistent or inaccessible Link Pack Area (LPA) libraries.
IBM z/OS must specify SMF data options to ensure appropriate activation.
Autoplay must be turned off for non-volume devices.
The default autorun behavior must be configured to prevent autorun commands.
Autoplay must be disabled for all drives.
AutoPlay must be turned off for non-volume devices.
The default AutoRun behavior must be configured to prevent AutoRun commands.
AutoPlay must be disabled for all drives.
Windows Server 2019 Autoplay must be turned off for non-volume devices.
Windows Server 2019 default AutoRun behavior must be configured to prevent AutoRun commands.
Windows Server 2019 AutoPlay must be disabled for all drives.
Windows Server 2022 Autoplay must be turned off for nonvolume devices.
Windows Server 2022 default AutoRun behavior must be configured to prevent AutoRun commands.
Windows Server 2022 AutoPlay must be disabled for all drives.
The Oracle Linux operating system must mount /dev/shm with secure options.
OL 8 must mount "/dev/shm" with the "nodev" option.
OL 8 must mount "/dev/shm" with the "nosuid" option.
OL 8 must mount "/dev/shm" with the "noexec" option.
OL 8 must mount "/tmp" with the "nodev" option.
OL 8 must mount "/tmp" with the "nosuid" option.
OL 8 must mount "/tmp" with the "noexec" option.
OL 8 must mount "/var/log" with the "nodev" option.
OL 8 must mount "/var/log" with the "nosuid" option.
OL 8 must mount "/var/log" with the "noexec" option.
OL 8 must mount "/var/log/audit" with the "nodev" option.
OL 8 must mount "/var/log/audit" with the "nosuid" option.
OL 8 must mount "/var/log/audit" with the "noexec" option.
OL 8 must mount "/var/tmp" with the "nodev" option.
OL 8 must mount "/var/tmp" with the "nosuid" option.
OL 8 must mount "/var/tmp" with the "noexec" option.
The OL 8 "fapolicy" module must be installed.
The OL 8 "fapolicy" module must be enabled.
The OL 8 fapolicy module must be configured to employ a deny-all, permit-by-exception policy to allow the execution of authorized software programs.
Rancher RKE2 must be configured with only essential configurations.
OpenShift must prevent the installation of patches, service packs, device drivers, or operating system components without verification they have been digitally signed using a certificate that is recognized and approved by the organization.
The Red Hat Enterprise Linux operating system must mount /dev/shm with secure options.
RHEL 8 must mount /dev/shm with the nodev option.
RHEL 8 must mount /dev/shm with the nosuid option.
RHEL 8 must mount /dev/shm with the noexec option.
RHEL 8 must mount /tmp with the nodev option.
RHEL 8 must mount /tmp with the nosuid option.
RHEL 8 must mount /tmp with the noexec option.
RHEL 8 must mount /var/log with the nodev option.
RHEL 8 must mount /var/log with the nosuid option.
RHEL 8 must mount /var/log with the noexec option.
RHEL 8 must mount /var/log/audit with the nodev option.
RHEL 8 must mount /var/log/audit with the nosuid option.
RHEL 8 must mount /var/log/audit with the noexec option.
RHEL 8 must mount /var/tmp with the nodev option.
RHEL 8 must mount /var/tmp with the nosuid option.
RHEL 8 must mount /var/tmp with the noexec option.
The RHEL 8 fapolicy module must be installed.
The RHEL 8 fapolicy module must be enabled.
The RHEL 8 fapolicy module must be configured to employ a deny-all, permit-by-exception policy to allow the execution of authorized software programs.
RHEL 9 must prevent device files from being interpreted on file systems that contain user home directories.
RHEL 9 must prevent files with the setuid and setgid bit set from being executed on file systems that contain user home directories.
RHEL 9 must mount /boot with the nodev option.
RHEL 9 must prevent files with the setuid and setgid bit set from being executed on the /boot directory.
RHEL 9 must prevent files with the setuid and setgid bit set from being executed on the /boot/efi directory.
RHEL 9 must mount /dev/shm with the nodev option.
RHEL 9 must mount /dev/shm with the noexec option.
RHEL 9 must mount /dev/shm with the nosuid option.
RHEL 9 must mount /tmp with the nodev option.
RHEL 9 must mount /tmp with the noexec option.
RHEL 9 must mount /tmp with the nosuid option.
RHEL 9 must mount /var with the nodev option.
RHEL 9 must mount /var/log with the nodev option.
RHEL 9 must mount /var/log with the noexec option.
RHEL 9 must mount /var/log with the nosuid option.
RHEL 9 must mount /var/log/audit with the nodev option.
RHEL 9 must mount /var/log/audit with the noexec option.
RHEL 9 must mount /var/log/audit with the nosuid option.
RHEL 9 must mount /var/tmp with the nodev option.
RHEL 9 must mount /var/tmp with the noexec option.
RHEL 9 must mount /var/tmp with the nosuid option.
RHEL 9 must disable the graphical user interface autorun function unless required.
SUSE operating system AppArmor tool must be configured to control whitelisted applications and user home directory access control.
RHEL 9 fapolicy module must be installed.
RHEL 9 fapolicy module must be enabled.
The operating system must employ automated mechanisms to prevent program execution in accordance with the organization-defined specifications.
Samsung Android must be configured to enforce an application installation policy by specifying an application allowlist that restricts applications by the following characteristics: names.
Samsung Android's Work profile must be configured to enforce an application installation policy by specifying an application allowlist that restricts applications by the following characteristics: names.
The VMM must prevent use of service and helper VMs not required to support proper VMM function.
The VMM must prevent inappropriate use of redundant guest VMs.
Ubuntu 22.04 LTS must have the "apparmor" package installed.
Ubuntu 22.04 LTS must be configured to use AppArmor.
For Impact Levels 4 and 5, the Mission Owner must register all cloud-based services, their CSP/CSO, and connection method in the DISA Systems/Network Approval Process (SNAP) database Cloud Module.
For Impact Level 6, the Mission Owner must process connection approval to the SIPRNet through the DISA classified connection approval process.
The Mission Owner of the Infrastructure as a Service (IaaS)/Platform as a Service (PaaS) must remove orphaned or unused virtual machine (VM) instances.
Dragos Platforms must limit privileges and not allow the ability to run shell.
Google Android 15 must be configured to enforce an application installation policy by specifying an application allow list that restricts applications by the following characteristics: [selection: list of digital signatures, cryptographic hash values, names, application version].
Least privilege access and need to know must be required to access MKE runtime and instantiate container images.