Boot Loader Is Not Installed On Removeable Media
Disable GSSAPI Authentication
Disable Kerberos Authentication
UEFI Boot Loader Is Not Installed On Removeable Media
Ensure rsyslog Does Not Accept Remote Messages Unless Acting As Log Server
Ensure No Device Files are Unlabeled by SELinux
Uninstall tftp-server Package
Adobe Acrobat Pro DC Continuous privileged file and folder locations must be disabled.
Adobe Acrobat Pro DC Continuous privileged host locations must be disabled.
Adobe Reader DC must disable the ability to add Trusted Files and Folders.
Adobe Reader DC must disable the ability to elevate IE Trusts to Privileged Locations.
Apache web server application directories, libraries, and configuration files must only be accessible to privileged users.
Anonymous user access to the Apache web server application directories must be prohibited.
The application server must enforce access restrictions associated with changes to application server configuration.
If the Arista network device uses role-based access control, the network device must enforce organization-defined role-based access control policies over defined subjects and objects.
The application must enforce access restrictions associated with changes to application configuration.
The commands that allow dynamic definitions of PROGRAM/TASK and the dynamic varying of memory must be secured.
Databases must be secured to protect from structural changes.
Database utilities must be secured in CA IDMS and permissions given to appropriate role(s)/groups(s) in the external security manager (ESM).
The online debugger which can change programs and storage in the CA IDMS address space must be secured.
CA IDMS programs that can be run through a CA IDMS CV must be defined to the CV.
A policy set using the built-in role-based access control (RBAC) capabilities in the Universal Control Plane (UCP) component of Docker Enterprise must be configured.
A policy set using the built-in role-based access control (RBAC) capabilities in the Docker Trusted Registry (DTR) component of Docker Enterprise must be set.
The FortiGate device must enforce access restrictions associated with changes to device configuration.
Forescout must enforce access restrictions associated with changes to device configuration.
The DataPower Gateway must enforce access restrictions associated with changes to device configuration.
The server.xml file must be protected from unauthorized modification.
DB2 and the operating system must enforce access restrictions associated with changes to the configuration of DB2 or database(s).
The WebSphere Application Server users in a local user registry group must be authorized for that group.
The WebSphere Application Server users in the admin role must be authorized.
The Apache Tomcat shutdown port must be disabled.
The ISEC7 EMM Suite must remove any unnecessaryusers or groups that have permissions to the server.xml file in Apache Tomcat.
The MySQL DatabasePassword key must be removed or set to a blank value in the database configuration file in Jamf Pro EMM.
Production JBoss servers must not allow automatic application deployment.
The Mainframe Product must enforce access restrictions associated with changes to application configuration.
Azure SQL Database must enforce access restrictions associated with changes to the configuration of the Azure SQL Database server or database(s).
Exchange software baseline copy must exist.
An Exchange software baseline copy must exist.
The Exchange software baseline copy must exist.
SQL Server and Windows must enforce access restrictions associated with changes to the configuration of the SQL Server instance or database(s).
ONTAP must enforce access restrictions associated with changes to the device configuration.
The network device must enforce access restrictions associated with changes to device configuration.
Nutanix AOS must enforce access restrictions associated with changes to application server configuration.
Nutanix AOS must not be configured to allow GSSAPIAuthentication.
Nutanix AOS must not be configured to allow KerberosAuthentication.
Users requiring access to Prisma Cloud Compute's Credential Store must be assigned and accessed by the appropriate role holders.
The SDN controller must be configured to enforce access restrictions associated with changes to the configuration.
Tanium must prohibit user installation of software without explicit privileged status and enforce access restrictions associated with changes to application configuration.
The Tanium application must prohibit user installation of software without explicit privileged status.
The TippingPoint SMS must enforce access restrictions associated with changes to device configuration.
The TippingPoint SMS must be configured to use an authentication server for the purpose of authenticating users prior to granting administrative access and to enforce access restrictions.
The UEM server must enforce access restrictions associated with changes to the server configuration.
Files in the $CATALINA_BASE/conf/ folder must have their permissions set to 640.
$CATALINA_BASE/conf folder permissions must be set to 750.
$CATALINA_HOME folder must be owned by the root user, group tomcat.
$CATALINA_BASE/conf/ folder must be owned by root, group tomcat.
$CATALINA_BASE/logs/ folder must be owned by tomcat user, group tomcat.
$CATALINA_BASE/temp/ folder must be owned by tomcat user, group tomcat.
$CATALINA_BASE/temp folder permissions must be set to 750.
$CATALINA_BASE/work/ folder must be owned by tomcat user, group tomcat.
The macOS system must enforce access restrictions.
The macOS system must disable the guest account.
The macOS system must disable root logon.
The macOS system must disable root logon for SSH.
The macOS system must disable the guest account.
PostgreSQL must enforce access restrictions associated with changes to the configuration of PostgreSQL or database(s).
The container platform must enforce access restrictions for container platform configuration changes.
The EDB Postgres Advanced Server must enforce access restrictions associated with changes to the configuration of the EDB Postgres Advanced Server or database(s).
The DBMS must enforce access restrictions associated with changes to the configuration of the DBMS or database(s).
The operating system must enforce access restrictions.
SSMC web server application, libraries, and configuration files must only be accessible to privileged users.
AIX must provide audit record generation functionality for DoD-defined auditable events.
CA-ACF2 must be installed, functional, and properly configured.
IBM RACF SETROPTS RVARYPW values must be properly set.
CA-TSS must be installed and properly configured.
The ICS must be configured to prevent nonprivileged users from executing privileged functions.
The Juniper EX switch must be configured to enforce access restrictions associated with changes to device configuration.
MariaDB must enforce access restrictions associated with changes to the configuration of MariaDB or database(s).
MongoDB must enforce access restrictions associated with changes to the configuration of MongoDB or database(s).
Access to web administration tools must be restricted to the web manager and the web managers designees.
SQL Server must enforce access restrictions associated with changes to the configuration of the database(s).
SQL Server must enforce access restrictions associated with changes to the configuration of the instance.
Windows must enforce access restrictions associated with changes to the configuration of the SQL Server instance.
The DBMS must support enforcement of logical access restrictions associated with changes to the DBMS configuration and to the database itself.
The Oracle Linux operating system must not allow removable media to be used as the boot loader unless approved.
The Oracle Linux operating system must be configured so that the SSH daemon does not permit Generic Security Service Application Program Interface (GSSAPI) authentication unless needed.
The Oracle Linux operating system must be configured so that the SSH daemon does not permit Kerberos authentication unless needed.
The MySQL Database Server 8.0 must enforce access restrictions associated with changes to the configuration of the MySQL Database Server 8.0 or database(s).
Redis Enterprise DBMS must enforce access restrictions associated with changes to the configuration of Redis Enterprise DBMS or database(s).
OpenShift RBAC access controls must be enforced.
The Automation Controller NGINX web server application, libraries, and configuration files must only be accessible to privileged users.
The Red Hat Enterprise Linux operating system must be configured so that all system device files are correctly labeled to prevent unauthorized modification.
The Red Hat Enterprise Linux operating system must set the umask value to 077 for all local interactive user accounts.
The Red Hat Enterprise Linux operating system must not allow removable media to be used as the boot loader unless approved.
The Red Hat Enterprise Linux operating system must be configured so that the rsyslog daemon does not accept log messages from other servers unless the server is being used for log aggregation.
The Red Hat Enterprise Linux operating system must be configured so that the SSH daemon does not permit Generic Security Service Application Program Interface (GSSAPI) authentication unless needed.
The Red Hat Enterprise Linux operating system must be configured so that the SSH daemon does not permit Kerberos authentication unless needed.
The Red Hat Enterprise Linux operating system must not have the Trivial File Transfer Protocol (TFTP) server package installed if not required for operational support.
RHEL 9 SSH daemon must not allow GSSAPI authentication.
RHEL 9 SSH daemon must not allow Kerberos authentication.
The VMM must enforce access restrictions associated with changes to the system.
VAMI server binaries and libraries must be verified for their integrity.
Performance Charts directory tree must have permissions in an out-of-the-box state.
ESX Agent Manager directory tree must have permissions in an out-of-the-box state.
ESX Agent Manager must set the secure flag for cookies.
Lookup Service directory tree must have permissions in an out-of-the-box state.
The vCenter Server user roles must be verified.
VMware Postgres configuration files must not be accessible by unauthorized users.
The Security Token Service directory tree must have permissions in an out-of-the-box state.
The vCenter Server users must have the correct roles assigned.
The vCenter ESX Agent Manager service files must have permissions in an out-of-the-box state.
The vCenter Lookup service files must have permissions in an out-of-the-box state.
The vSphere UI directory tree must have permissions in an out-of-the-box state.
The vCenter Perfcharts service files must have permissions in an out-of-the-box state.
The vCenter PostgreSQL service configuration files must not be accessible by unauthorized users.
The vCenter STS service files must have permissions in an out-of-the-box state.
The web server application, libraries, and configuration files must only be accessible to privileged users.
The BIG-IP appliance must be configured to enforce access restrictions associated with changes to device configuration.
The macOS system must disable root login.
The macOS system must disable root login for SSH.
PostgreSQL must enforce access restrictions associated with changes to the configuration of the DBMS or database(s).
The ISEC7 SPHERE must remove any unnecessary users or groups that have permissions to the server.xml file in Apache Tomcat.
Least privilege access and need to know must be required to access MKE runtime and instantiate container images.
The NSX Manager must assign users/accounts to organization-defined roles configured with approved authorizations.