CCI-002165
Enforce organization-defined discretionary access control policies over defined subjects and objects.
4 rules found Severity: Medium

A policy set using the built-in role-based access control (RBAC) capabilities in the Universal Control Plane (UCP) component of Docker Enterprise must be configured.
1 rule found Severity: Medium

A policy set using the built-in role-based access control (RBAC) capabilities in the Docker Trusted Registry (DTR) component of Docker Enterprise must be set.
1 rule found Severity: Medium

If the HP FlexFabric Switch uses discretionary access control, the HP FlexFabric Switch must enforce organization-defined discretionary access control policies over defined subjects and objects.
1 rule found Severity: Medium

If the HYCU Server or Web UI uses discretionary access control, the network device must enforce organization-defined discretionary access control policies over defined subjects and objects.
1 rule found Severity: Medium

If the DataPower Gateway uses discretionary access control, the DataPower Gateway must enforce organization-defined discretionary access control policies over defined subjects and objects.
1 rule found Severity: Medium

The IBM Aspera Console private/secret cryptographic keys file must be group-owned by root to prevent unauthorized read access.
1 rule found Severity: Medium

The IBM Aspera Console private/secret cryptographic keys file must be owned by root to prevent unauthorized read access.
1 rule found Severity: Medium

The IBM Aspera Console private/secret cryptographic keys file must have a mode of 0600 or less permissive to prevent unauthorized read access.
1 rule found Severity: Medium

The IBM Aspera Faspex private/secret cryptographic keys file must have a mode of 0600 or less permissive to prevent unauthorized read access.
1 rule found Severity: Medium

The IBM Aspera Faspex private/secret cryptographic keys file must be group-owned by faspex to prevent unauthorized read access.
1 rule found Severity: Medium

The IBM Aspera Faspex private/secret cryptographic keys file must be owned by faspex to prevent unauthorized read access.
1 rule found Severity: Medium

The IBM Aspera Shares private/secret cryptographic keys file must be group-owned by nobody to prevent unauthorized read access.
1 rule found Severity: Medium

The IBM Aspera Shares private/secret cryptographic keys file must be owned by nobody to prevent unauthorized read access.
1 rule found Severity: Medium

The IBM Aspera Shares private/secret cryptographic keys file must have a mode of 0400 or less permissive to prevent unauthorized read access.
1 rule found Severity: Medium

The IBM Aspera High-Speed Transfer Server private/secret cryptographic keys file must be group-owned by root to prevent unauthorized read access.
1 rule found Severity: Medium

The IBM Aspera High-Speed Transfer Server private/secret cryptographic keys file must be owned by root to prevent unauthorized read access.
1 rule found Severity: Medium

The IBM Aspera High-Speed Transfer Server private/secret cryptographic keys file must have a mode of 0600 or less permissive to prevent unauthorized read access.
1 rule found Severity: Medium

2 rules found Severity: Medium

1 rule found Severity: Medium

Control of the Tanium Client service must be restricted to SYSTEM access only for all managed clients.
5 rules found Severity: Medium

5 rules found Severity: Medium

The permissions on the Tanium Client directory must be restricted to only the SYSTEM account on all managed clients.
5 rules found Severity: Medium

3 rules found Severity: Medium

The Tanium Server http directory and sub-directories must be restricted with appropriate permissions.
2 rules found Severity: Medium

The permissions on the Tanium Server registry keys must be restricted to only the Tanium service account and the [Tanium Admins] group.
3 rules found Severity: Medium

3 rules found Severity: Medium

Pam_Apparmor must be configured to allow system administrators to pass information to any other Ubuntu operating system administrator or user, change security attributes, and to confine all non-privileged users from executing functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures.
1 rule found Severity: Low

MongoDB must enforce discretionary access control policies, as defined by the data owner, over defined subjects and objects.
2 rules found Severity: Medium

The DBMS must enforce Discretionary Access Control (DAC) policy allowing users to specify and control sharing by named individuals, groups of individuals, or by both, limiting propagation of access rights and includes or excludes access to the granularity of a single user.
1 rule found Severity: Medium

Databases utilizing Discretionary Access Control (DAC) must enforce a policy that limits propagation of access rights.
2 rules found Severity: Medium

A DBMS utilizing Discretionary Access Control (DAC) must enforce a policy that includes or excludes access to the granularity of a single user.
2 rules found Severity: Medium

PostgreSQL must enforce discretionary access control policies, as defined by the data owner, over defined subjects and objects.
3 rules found Severity: Medium

The Red Hat Enterprise Linux operating system must be configured so that the file permissions, ownership, and group membership of system files and commands match the vendor values.
1 rule found Severity: High

The Red Hat Enterprise Linux operating system must prevent nonprivileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures.
1 rule found Severity: Medium

1 rule found Severity: Medium

The Red Hat Enterprise Linux operating system must be configured so that all files and directories have a valid owner.
1 rule found Severity: Medium

The Red Hat Enterprise Linux operating system must be configured so that all files and directories have a valid group owner.
1 rule found Severity: Medium

The Red Hat Enterprise Linux operating system must confine SELinux users to roles that conform to least privilege.
1 rule found Severity: Medium

1 rule found Severity: Medium

The Red Hat Enterprise Linux operating system must elevate the SELinux context when an administrator calls the sudo command.
1 rule found Severity: Medium

EDB Postgres Advanced Server must enforce discretionary access control policies, as defined by the data owner, over defined subjects and objects.
1 rule found Severity: Medium

The EDB Postgres Advanced Server must enforce discretionary access control policies, as defined by the data owner, over defined subjects and objects.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

AIX must turn on enhanced Role-Based Access Control (RBAC) to isolate security functions from nonsecurity functions, to grant system privileges to other operating system admins, and prohibit user installation of system software without explicit privileged status.
1 rule found Severity: Medium

MongoDB must enforce discretionary access control (DAC) policies, as defined by the data owner, over defined subjects and objects.
1 rule found Severity: Medium

Azure SQL Database must enforce discretionary access control policies, as defined by the data owner, over defined subjects and objects.
1 rule found Severity: Medium

Only accounts responsible for the administration of a system must have Administrator rights on the system.
1 rule found Severity: High

Only authorized user accounts must be allowed to create or run virtual machines on Windows 11 systems.
1 rule found Severity: Medium

2 rules found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

If the network device uses discretionary access control, the network device must enforce organization-defined discretionary access control policies over defined subjects and objects.
1 rule found Severity: Medium

The Oracle Linux operating system must prevent nonprivileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures.
1 rule found Severity: Medium

1 rule found Severity: Medium

The Oracle Linux operating system must confine SELinux users to roles that conform to least privilege.
1 rule found Severity: Medium

1 rule found Severity: Medium

The Oracle Linux operating system must elevate the SELinux context when an administrator calls the sudo command.
1 rule found Severity: Medium

The MySQL Database Server 8.0 must enforce discretionary access control policies, as defined by the data owner, over defined subjects and objects.
1 rule found Severity: Medium

Redis Enterprise DBMS must enforce discretionary access control policies, as defined by the data owner, over defined subjects and objects.
1 rule found Severity: Medium

Redis Enterprise DBMS must enforce access control lists, as defined by the data owner, over defined subjects and objects.
1 rule found Severity: Medium

1 rule found Severity: High

The Tanium Server http directory and subdirectories must be restricted with appropriate permissions.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

The application must enforce organization-defined discretionary access control policies over defined subjects and objects.
1 rule found Severity: Medium

The DBMS must enforce discretionary access control policies, as defined by the data owner, over defined subjects and objects.
1 rule found Severity: Medium

The operating system must allow operating system admins to pass information to any other operating system admin or user.
1 rule found Severity: Medium

The operating system must allow operating system admins to grant their privileges to other operating system admins.
1 rule found Severity: Medium

The operating system must allow operating system admins to change security attributes on users, the operating system, or the operating systems components.
1 rule found Severity: Medium

The Mainframe Product must enforce organization-defined discretionary access control policies over defined subjects and objects.
1 rule found Severity: Medium

MariaDB must enforce discretionary access control policies, as defined by the data owner, over defined subjects, and objects.
1 rule found Severity: Medium

SQL Server must enforce discretionary access control policies, as defined by the data owner, over defined subjects and objects.
1 rule found Severity: Low

Windows Server 2019 permissions for the system drive root directory (usually C:\) must conform to minimum requirements.
1 rule found Severity: Medium

1 rule found Severity: Medium

Windows Server 2019 permissions for the Windows installation directory must conform to minimum requirements.
1 rule found Severity: Medium

Windows Server 2022 permissions for the system drive root directory (usually C:\) must conform to minimum requirements.
1 rule found Severity: Medium

1 rule found Severity: Medium

Windows Server 2022 permissions for the Windows installation directory must conform to minimum requirements.
1 rule found Severity: Medium

The DBMS must enforce Discretionary Access Control (DAC) policy allowing users to specify and control sharing by named individuals, groups of individuals, or by both, limiting propagation of access rights and including or excluding access to the granularity of a single user.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

The SUSE operating system Apparmor tool must be configured to control whitelisted applications and user home directory access control.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

SUSE operating system AppArmor tool must be configured to control whitelisted applications and user home directory access control.
1 rule found Severity: Medium

The VMM must implement discretionary access controls to allow VMM admins to pass information to any other VMM admin, user, or guest VM.
1 rule found Severity: Medium

The VMM must implement discretionary access controls to allow VMM admins to grant their privileges to other VMM admins.
1 rule found Severity: Medium

The VMM must implement discretionary access controls to allow VMM admins to change security attributes on users, guest VMs, the VMM, or the VMMs components.
1 rule found Severity: Medium
