Ensure All Files Are Owned by a Group
Enable Kernel Parameter to Enforce DAC on Hardlinks
Enable Kernel Parameter to Enforce DAC on Symlinks
Ensure SELinux State is Enforcing
Ensure All Files Are Owned by a User
Confine SELinux Users To Roles That Conform To Least Privilege
Elevate The SELinux Context When An Administrator Calls The Sudo Command
Map System Users To The Appropriate SELinux Role
Disable the ssh_sysadm_login SELinux Boolean
Ensure AppArmor is installed
Install the pam_apparmor Package
Ensure AppArmor is Active and Configured
The application must enforce organization-defined discretionary access control policies over defined subjects and objects.
A policy set using the built-in role-based access control (RBAC) capabilities in the Universal Control Plane (UCP) component of Docker Enterprise must be configured.
A policy set using the built-in role-based access control (RBAC) capabilities in the Docker Trusted Registry (DTR) component of Docker Enterprise must be set.
If the HP FlexFabric Switch uses discretionary access control, the HP FlexFabric Switch must enforce organization-defined discretionary access control policies over defined subjects and objects.
If the HYCU Server or Web UI uses discretionary access control, the network device must enforce organization-defined discretionary access control policies over defined subjects and objects.
If the DataPower Gateway uses discretionary access control, the DataPower Gateway must enforce organization-defined discretionary access control policies over defined subjects and objects.
The IBM Aspera Console private/secret cryptographic keys file must be group-owned by root to prevent unauthorized read access.
The IBM Aspera Console private/secret cryptographic keys file must be owned by root to prevent unauthorized read access.
The IBM Aspera Console private/secret cryptographic keys file must have a mode of 0600 or less permissive to prevent unauthorized read access.
The IBM Aspera Faspex private/secret cryptographic keys file must have a mode of 0600 or less permissive to prevent unauthorized read access.
The IBM Aspera Faspex private/secret cryptographic keys file must be group-owned by faspex to prevent unauthorized read access.
The IBM Aspera Faspex private/secret cryptographic keys file must be owned by faspex to prevent unauthorized read access.
The IBM Aspera Shares private/secret cryptographic keys file must be group-owned by nobody to prevent unauthorized read access.
The IBM Aspera Shares private/secret cryptographic keys file must be owned by nobody to prevent unauthorized read access.
The IBM Aspera Shares private/secret cryptographic keys file must have a mode of 0400 or less permissive to prevent unauthorized read access.
The IBM Aspera High-Speed Transfer Server private/secret cryptographic keys file must be group-owned by root to prevent unauthorized read access.
The IBM Aspera High-Speed Transfer Server private/secret cryptographic keys file must be owned by root to prevent unauthorized read access.
The IBM Aspera High-Speed Transfer Server private/secret cryptographic keys file must have a mode of 0600 or less permissive to prevent unauthorized read access.
The Mainframe Product must enforce organization-defined discretionary access control policies over defined subjects and objects.
Azure SQL Database must enforce discretionary access control policies, as defined by the data owner, over defined subjects and objects.
Changing permissions on rights managed content for users must be enforced.
Office must be configured to not allow read with browsers.
If the network device uses discretionary access control, the network device must enforce organization-defined discretionary access control policies over defined subjects and objects.
Nutanix AOS must enforce discretionary access control on symlinks and hardlinks.
Control of the Tanium Client service must be restricted to SYSTEM access only for all managed clients.
The ability to uninstall the Tanium Client service must be disabled on all managed clients.
The permissions on the Tanium Client directory must be restricted to only the SYSTEM account on all managed clients.
The Tanium Server directory must be restricted with appropriate permissions.
The Tanium Server http directory and sub-directories must be restricted with appropriate permissions.
The permissions on the Tanium Server registry keys must be restricted to only the Tanium service account and the [Tanium Admins] group.
The Tanium Server Logs and TDL_Logs directories must be restricted with appropriate permissions.
The Tanium Server http directory and subdirectories must be restricted with appropriate permissions.
Pam_Apparmor must be configured to allow system administrators to pass information to any other Ubuntu operating system administrator or user, change security attributes, and to confine all non-privileged users from executing functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures.
The Ubuntu operating system must be configured to use AppArmor.
PostgreSQL must enforce discretionary access control policies, as defined by the data owner, over defined subjects and objects.
The EDB Postgres Advanced Server must enforce discretionary access control policies, as defined by the data owner, over defined subjects and objects.
The DBMS must enforce discretionary access control policies, as defined by the data owner, over defined subjects and objects.
The operating system must allow operating system admins to pass information to any other operating system admin or user.
The operating system must allow operating system admins to grant their privileges to other operating system admins.
The operating system must allow operating system admins to change security attributes on users, the operating system, or the operating systems components.
AIX must use Trusted Execution (TE) Check policy.
AIX must allow admins to send a message to all the users who logged in currently.
AIX must allow admins to send a message to a user who logged in currently.
AIX must turn on enhanced Role-Based Access Control (RBAC) to isolate security functions from nonsecurity functions, to grant system privileges to other operating system admins, and prohibit user installation of system software without explicit privileged status.
MariaDB must enforce discretionary access control policies, as defined by the data owner, over defined subjects, and objects.
MongoDB must enforce discretionary access control policies, as defined by the data owner, over defined subjects and objects.
SQL Server must enforce discretionary access control policies, as defined by the data owner, over defined subjects and objects.
Permissions for system files and directories must conform to minimum requirements.
Only accounts responsible for the administration of a system must have Administrator rights on the system.
Only authorized user accounts must be allowed to create or run virtual machines on Windows 11 systems.
Permissions for the system drive root directory (usually C:\) must conform to minimum requirements.
Permissions for program file directories must conform to minimum requirements.
Permissions for the Windows installation directory must conform to minimum requirements.
Windows Server 2019 permissions for the system drive root directory (usually C:\) must conform to minimum requirements.
Windows Server 2019 permissions for program file directories must conform to minimum requirements.
Windows Server 2019 permissions for the Windows installation directory must conform to minimum requirements.
Windows Server 2022 permissions for the system drive root directory (usually C:\) must conform to minimum requirements.
Windows Server 2022 permissions for program file directories must conform to minimum requirements.
Windows Server 2022 permissions for the Windows installation directory must conform to minimum requirements.
The DBMS must enforce Discretionary Access Control (DAC) policy allowing users to specify and control sharing by named individuals, groups of individuals, or by both, limiting propagation of access rights and includes or excludes access to the granularity of a single user.
Databases utilizing Discretionary Access Control (DAC) must enforce a policy that limits propagation of access rights.
A DBMS utilizing Discretionary Access Control (DAC) must enforce a policy that includes or excludes access to the granularity of a single user.
The DBMS must enforce Discretionary Access Control (DAC) policy allowing users to specify and control sharing by named individuals, groups of individuals, or by both, limiting propagation of access rights and including or excluding access to the granularity of a single user.
The Oracle Linux operating system must prevent nonprivileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures.
The Oracle Linux operating system must enable SELinux.
The Oracle Linux operating system must enable the SELinux targeted policy.
The Oracle Linux operating system must confine SELinux users to roles that conform to least privilege.
The Oracle Linux operating system must not allow privileged accounts to utilize SSH.
The Oracle Linux operating system must elevate the SELinux context when an administrator calls the sudo command.
OL 8 must enable kernel parameters to enforce Discretionary Access Control (DAC) on symlinks.
OL 8 must enable kernel parameters to enforce Discretionary Access Control (DAC) on hardlinks.
The MySQL Database Server 8.0 must enforce discretionary access control policies, as defined by the data owner, over defined subjects and objects.
Redis Enterprise DBMS must enforce discretionary access control policies, as defined by the data owner, over defined subjects and objects.
Redis Enterprise DBMS must enforce access control lists, as defined by the data owner, over defined subjects and objects.
RHEL 8 must enable kernel parameters to enforce discretionary access control on symlinks.
RHEL 8 must enable kernel parameters to enforce discretionary access control on hardlinks.
The Red Hat Enterprise Linux operating system must be configured so that the file permissions, ownership, and group membership of system files and commands match the vendor values.
The Red Hat Enterprise Linux operating system must prevent nonprivileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures.
The Red Hat Enterprise Linux operating system must enable SELinux.
The Red Hat Enterprise Linux operating system must enable the SELinux targeted policy.
The Red Hat Enterprise Linux operating system must be configured so that all files and directories have a valid owner.
The Red Hat Enterprise Linux operating system must be configured so that all files and directories have a valid group owner.
The Red Hat Enterprise Linux operating system must confine SELinux users to roles that conform to least privilege.
The Red Hat Enterprise Linux operating system must not allow privileged accounts to utilize SSH.
The Red Hat Enterprise Linux operating system must elevate the SELinux context when an administrator calls the sudo command.
RHEL 9 must enable kernel parameters to enforce discretionary access control on hardlinks.
RHEL 9 must enable kernel parameters to enforce discretionary access control on symlinks.
The SUSE operating system Apparmor tool must be configured to control whitelisted applications and user home directory access control.
All SUSE operating system files and directories must have a valid owner.
All SUSE operating system files and directories must have a valid group owner.
SUSE operating system AppArmor tool must be configured to control whitelisted applications and user home directory access control.
RHEL 9 must restrict the use of the "su" command.
The VMM must implement discretionary access controls to allow VMM admins to pass information to any other VMM admin, user, or guest VM.
The VMM must implement discretionary access controls to allow VMM admins to grant their privileges to other VMM admins.
The VMM must implement discretionary access controls to allow VMM admins to change security attributes on users, guest VMs, the VMM, or the VMMs components.
The VMM must implement discretionary access controls to allow VMM admins to choose the security attributes to be associated with newly created or revised guest VMs.
EDB Postgres Advanced Server must enforce discretionary access control policies, as defined by the data owner, over defined subjects and objects.
Ubuntu 22.04 LTS must have the "apparmor" package installed.
MongoDB must enforce discretionary access control (DAC) policies, as defined by the data owner, over defined subjects and objects.
SLEM 5 must use a Linux Security Module configured to enforce limits on system services.
TOSS must enable kernel parameters to enforce discretionary access control on symlinks.
TOSS must enable kernel parameters to enforce discretionary access control on hardlinks.