CCI-002233
Prevent the organization-defined software from executing at higher privilege levels than users executing the software.
1 rule found Severity: Medium

A policy set using the built-in role-based access control (RBAC) capabilities in the Universal Control Plane (UCP) component of Docker Enterprise must be configured.
1 rule found Severity: Medium

A policy set using the built-in role-based access control (RBAC) capabilities in the Docker Trusted Registry (DTR) component of Docker Enterprise must be set.
1 rule found Severity: Medium

Docker Enterprise images must be built with the USER instruction to prevent containers from running as root.
1 rule found Severity: Medium

Google Android 12 must be configured to disable exceptions to the access control policy that prevent [selection: application processes, groups of application processes] from accessing [selection: all, private] data stored by other [selection: application processes, groups of application processes].
1 rule found Severity: Medium

Microsoft Android 11 must be configured to disable exceptions to the access control policy that prevent application processes from accessing all data stored by other application processes.
1 rule found Severity: Medium

Execution of software modules (to include stored procedures, functions, and triggers) with elevated privileges must be restricted to necessary cases only.
11 rules found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

The Ubuntu operating system must prevent all software from executing at higher privilege levels than users executing the software and the audit system must be configured to audit the execution of privileged functions.
2 rules found Severity: Medium

Execution of software modules (to include functions and trigger procedures) with elevated privileges must be restricted to necessary cases only.
2 rules found Severity: Medium

Samsung Android's Work profile must be configured to disable exceptions to the access control policy that prevent application processes, and groups of application processes from accessing all data stored by other application processes, and groups of application processes.
2 rules found Severity: Medium

2 rules found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

Google Android 14 must be configured to disable exceptions to the access control policy that prevent [selection: application processes, groups of application processes] from accessing [selection: all, private] data stored by other [selection: application processes, groups of application processes].
2 rules found Severity: Medium

Google Android 13 must be configured to disable exceptions to the access control policy that prevent [selection: application processes, groups of application processes] from accessing [selection: all, private] data stored by other [selection: application processes, groups of application processes].
2 rules found Severity: Medium

NFS file systems on AIX must be mounted with the nosuid option unless the NFS file systems contain approved setuid or setgid programs.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

Docker CLI commands must be run with an MKE client trust bundle and without unnecessary permissions.
1 rule found Severity: Medium

MKE users must not have permissions to create containers or pods that share the host user namespace.
1 rule found Severity: Medium

1 rule found Severity: Medium

Azure SQL Database must restrict execution of stored procedures and functions that utilize [execute as] to necessary cases only.
1 rule found Severity: Medium

1 rule found Severity: High

Samsung Android's Work profile must be configured to disable exceptions to the access control policy that prevent application processes and groups of application processes from accessing all data stored by other application processes and groups of application processes.
3 rules found Severity: Medium

The TOSS audit system must prevent all software from executing at higher privilege levels than users executing the software and the audit system must be configured to audit the execution of privileged functions.
1 rule found Severity: Medium

NixOS must prevent all software from executing at higher privilege levels than users executing the software.
1 rule found Severity: Medium

1 rule found Severity: Medium

Ubuntu 22.04 LTS must prevent all software from executing at higher privilege levels than users executing the software and the audit system must be configured to audit the execution of privileged functions.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: High

Google Android 15 must be configured to disable exceptions to the access control policy that prevent [selection: application processes, groups of application processes] from accessing [selection: all, private] data stored by other [selection: application processes, groups of application processes].
1 rule found Severity: Medium

The operating system must prevent all software from executing at higher privilege levels than users executing the software.
1 rule found Severity: Medium

The IBM Security zSecure programs CKFCOLL and CKGRACF, and the APF-authorized version of program CKRCARLA, must be restricted to security administrators, security batch jobs performing External Security Manager (ESM) maintenance, auditors, and systems programmers, and must be audited.
1 rule found Severity: Medium

2 rules found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

3 rules found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

IBM z/OS scheduled production batch ACIDs must specify the CA-TSS BATCH Facility, and the Batch Job Scheduler must be authorized to the Scheduled production CA-TSS batch ACID.
1 rule found Severity: Medium

The Mainframe Product must prevent software as identified in the site security plan from executing at higher privilege levels than users executing the software.
1 rule found Severity: Medium

Execution of stored procedures and functions that utilize execute as must be restricted to necessary cases only.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

The OL 8 audit system must be configured to audit the execution of privileged functions and prevent all software from executing at higher privilege levels than users executing the software.
1 rule found Severity: Medium

Rancher RKE2 must prevent nonprivileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures.
1 rule found Severity: Medium

1 rule found Severity: High

The RHEL 8 audit system must be configured to audit the execution of privileged functions and prevent all software from executing at higher privilege levels than users executing the software.
1 rule found Severity: Medium

The SUSE operating system Apparmor tool must be configured to control whitelisted applications and user home directory access control.
1 rule found Severity: Medium

SUSE operating system AppArmor tool must be configured to control whitelisted applications and user home directory access control.
1 rule found Severity: Medium

The VMM must prevent all software from executing at higher privilege levels than users executing the software.
1 rule found Severity: Medium

2 rules found Severity: Medium

Zebra Android 13 must be configured to disable exceptions to the access control policy that prevent [selection: application processes, groups of application processes] from accessing [selection: all, private] data stored by other [selection: application processes, groups of application processes].
2 rules found Severity: Medium
