Capacity
CCI-002233
Prevent the organization-defined software from executing at higher privilege levels than users executing the software.
Choose one
15
Rule
Severity: Medium
Record Events When Privileged Executables Are Run
3
Rule
Severity: Medium
Install the pam_apparmor Package
5
Rule
Severity: Medium
Ensure AppArmor is Active and Configured
1
Rule
Severity: Medium
Apple iOS/iPadOS 15 must not allow non-DoD applications to access DoD data.
2
Rule
Severity: High
The application must execute without excessive account permissions.
2
Rule
Severity: Medium
IDMS must restrict the use of code that provides elevated privileges to specific instances.
1
Rule
Severity: Medium
A policy set using the built-in role-based access control (RBAC) capabilities in the Universal Control Plane (UCP) component of Docker Enterprise must be configured.
1
Rule
Severity: Medium
A policy set using the built-in role-based access control (RBAC) capabilities in the Docker Trusted Registry (DTR) component of Docker Enterprise must be set.
1
Rule
Severity: Medium
Docker Enterprise images must be built with the USER instruction to prevent containers from running as root.
1
Rule
Severity: Medium
Google Android 12 must be configured to disable exceptions to the access control policy that prevent [selection: application processes, groups of application processes] from accessing [selection: all, private] data stored by other [selection: application processes, groups of application processes].
4
Rule
Severity: Medium
Google Android 13 must be configured to disable exceptions to the access control policy that prevent [selection: application processes, groups of application processes] from accessing [selection: all, private] data stored by other [selection: application processes, groups of application processes].
2
Rule
Severity: Medium
The Mainframe Product must prevent software as identified in the site security plan from executing at higher privilege levels than users executing the software.
1
Rule
Severity: Medium
Microsoft Android 11 must be configured to disable exceptions to the access control policy that prevent application processes from accessing all data stored by other application processes.
2
Rule
Severity: Medium
Azure SQL Database must restrict execution of stored procedures and functions that utilize [execute as] to necessary cases only.
18
Rule
Severity: Medium
Execution of software modules (to include stored procedures, functions, and triggers) with elevated privileges must be restricted to necessary cases only.
2
Rule
Severity: Medium
Prisma Cloud Compute must prevent unauthorized and unintended information transfer.
3
Rule
Severity: Medium
Samsung Android's Work profile must be configured to disable exceptions to the access control policy that prevent application processes, and groups of application processes from accessing all data stored by other application processes, and groups of application processes.
1
Rule
Severity: Medium
Apple iOS/iPadOS 16 must not allow non-DOD applications to access DOD data.
1
Rule
Severity: Medium
Apple iOS/iPadOS 16 must not allow DOD applications to access non-DOD data.
3
Rule
Severity: Medium
Apple iOS/iPadOS 17 must not allow non-DOD applications to access DOD data.
2
Rule
Severity: Medium
Apple iOS/iPadOS 16 must not allow non-DoD applications to access DoD data.
3
Rule
Severity: Medium
The Ubuntu operating system must prevent all software from executing at higher privilege levels than users executing the software and the audit system must be configured to audit the execution of privileged functions.
3
Rule
Severity: Medium
Execution of software modules (to include functions and trigger procedures) with elevated privileges must be restricted to necessary cases only.
2
Rule
Severity: Medium
Container images instantiated by the container platform must execute using least privileges.
3
Rule
Severity: Medium
Google Android 14 must be configured to disable exceptions to the access control policy that prevent [selection: application processes, groups of application processes] from accessing [selection: all, private] data stored by other [selection: application processes, groups of application processes].
2
Rule
Severity: Medium
The operating system must prevent all software from executing at higher privilege levels than users executing the software.
2
Rule
Severity: Medium
NFS file systems on AIX must be mounted with the nosuid option unless the NFS file systems contain approved setuid or setgid programs.
4
Rule
Severity: Medium
IBM z/OS Surrogate users must be controlled in accordance with proper security requirements.
6
Rule
Severity: Medium
IBM z/OS UNIX resources must be protected in accordance with security requirements.
2
Rule
Severity: Medium
IBM RACF batch jobs must be properly secured.
2
Rule
Severity: Medium
IBM RACF batch jobs must be protected with propagation control.
2
Rule
Severity: Medium
The IBM RACF JES(BATCHALLRACF) SETROPTS value must be set to JES(BATCHALLRACF).
2
Rule
Severity: Medium
The IBM z/OS JES(XBMALLRACF) SETROPTS value must be set to JES(XBMALLRACF).
2
Rule
Severity: Medium
The CA-TSS SUBACID Control Option must be set to U,8.
2
Rule
Severity: Medium
CA-TSS must use propagation control to eliminate ACID inheritance.
2
Rule
Severity: Medium
IBM z/OS scheduled production batch ACIDs must specify the CA-TSS BATCH Facility, and the Batch Job Scheduler must be authorized to the Scheduled production CA-TSS batch ACID.
2
Rule
Severity: Medium
IBM z/OS surrogate users must be controlled in accordance with proper security requirements.
2
Rule
Severity: Medium
The IBM RACF classes required to properly secure the z/OS UNIX environment must be ACTIVE.
2
Rule
Severity: Medium
Execution of stored procedures and functions that utilize execute as must be restricted to necessary cases only.
2
Rule
Severity: Medium
Use of credentials and proxies must be restricted to necessary cases only.
2
Rule
Severity: Medium
Execution of startup stored procedures must be restricted to necessary cases only.
2
Rule
Severity: Medium
The OL 8 audit system must be configured to audit the execution of privileged functions and prevent all software from executing at higher privilege levels than users executing the software.
2
Rule
Severity: Medium
Rancher RKE2 must prevent nonprivileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures.
2
Rule
Severity: High
Container images instantiated by OpenShift must execute using least privileges.
2
Rule
Severity: Medium
The RHEL 8 audit system must be configured to audit the execution of privileged functions and prevent all software from executing at higher privilege levels than users executing the software.
2
Rule
Severity: Medium
The SUSE operating system Apparmor tool must be configured to control whitelisted applications and user home directory access control.
2
Rule
Severity: Medium
SUSE operating system AppArmor tool must be configured to control whitelisted applications and user home directory access control.
2
Rule
Severity: Medium
RHEL 9 must audit uses of the "execve" system call.
3
Rule
Severity: Medium
Samsung Android's Work profile must be configured to disable exceptions to the access control policy that prevent application processes and groups of application processes from accessing all data stored by other application processes and groups of application processes.
2
Rule
Severity: Medium
The VMM must prevent all software from executing at higher privilege levels than users executing the software.
3
Rule
Severity: Medium
The Photon operating system must be configured to audit the execution of privileged functions.
1
Rule
Severity: Medium
Apple iOS/iPadOS 17 must not allow DOD applications to access non-DOD data.
1
Rule
Severity: Medium
Ubuntu 22.04 LTS must prevent all software from executing at higher privilege levels than users executing the software and the audit system must be configured to audit the execution of privileged functions.
1
Rule
Severity: High
Dragos Platforms must limit privileges and not allow the ability to run shell.
1
Rule
Severity: Medium
Google Android 15 must be configured to disable exceptions to the access control policy that prevent [selection: application processes, groups of application processes] from accessing [selection: all, private] data stored by other [selection: application processes, groups of application processes].
1
Rule
Severity: Medium
The zSecure programs CKFCOLL and CKGRACF, and the APF-authorized version of program CKRCARLA, must be restricted to security administrators, security batch jobs performing External Security Manager (ESM) maintenance, auditors, and systems programmers, and audited.
1
Rule
Severity: Medium
All containers must be restricted from acquiring additional privileges.
1
Rule
Severity: Medium
All containers must be restricted to mounting the root filesystem as read only.
1
Rule
Severity: Medium
The default seccomp profile must not be disabled.
1
Rule
Severity: Medium
Docker CLI commands must be run with an MKE client trust bundle and without unnecessary permissions.
1
Rule
Severity: Medium
MKE users must not have permissions to create containers or pods that share the host user namespace.
1
Rule
Severity: Medium
Use of privileged Linux containers must be limited to system containers.
1
Rule
Severity: High
SLEM 5 must use a Linux Security Module configured to enforce limits on system services.
1
Rule
Severity: Medium
The TOSS audit system must prevent all software from executing at higher privilege levels than users executing the software and the audit system must be configured to audit the execution of privileged functions.
1
Rule
Severity: Medium
Apple iOS/iPadOS 18 must not allow non-DOD applications to access DOD data.
Patternfly
PatternFly elements
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.
Modules
66%