Confine SELinux Users To Roles That Conform To Least Privilege
Elevate The SELinux Context When An Administrator Calls The Sudo Command
Map System Users To The Appropriate SELinux Role
Disable the ssh_sysadm_login SELinux Boolean
Ensure AppArmor is installed
Install the pam_apparmor Package
Ensure AppArmor is Active and Configured
Update access to the directory schema must be restricted to appropriate accounts.
Non-privileged accounts on the hosting system must only access Apache web server security-relevant information and functions through a distinct administrative account.
The application server must prevent non-privileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures.
The application must prevent non-privileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures.
IDMS must prevent users without the appropriate access from executing privileged functions or tasks within the IDMS environment.
IDMS must prevent unauthorized users from executing certain privileged commands that can be used to change the runtime IDMS environment.
IDMS must protect its user catalogs and system dictionaries to prevent unauthorized users from bypassing or updating security settings.
A policy set using the built-in role-based access control (RBAC) capabilities in the Universal Control Plane (UCP) component of Docker Enterprise must be configured.
A policy set using the built-in role-based access control (RBAC) capabilities in the Docker Trusted Registry (DTR) component of Docker Enterprise must be set.
Google Android 13 must be configured to disable all data signaling over [assignment: list of externally accessible hardware ports (for example, USB)].
Google Android 12 must be configured to disable all data signaling over [assignment: list of externally accessible hardware ports (for example, USB)].
Users in a reader-role must be authorized.
DB2 must prevent non-privileged users from executing privileged functions, to include disabling, circumventing, or altering implemented security safeguards/countermeasures.
Sign-on to the ESCD Application Console must be restricted to only authorized personnel.
The Distributed Console Access Facility (DCAF) Console must be restricted to only authorized personnel.
Access to the Hardware Management Console must be restricted to only authorized personnel.
Automatic Call Answering to the Hardware Management Console must be disabled.
The WebSphere Application Server users in the admin role must be authorized.
The WebSphere Application Server users in a LDAP user registry group must be authorized for that group.
The IBM z/VM CP Privilege Class A, B, and D must be restricted to appropriate system operators.
The IBM z/VM Privilege Classes C and E must be restricted to appropriate system administrators.
The IBM z/VM Privilege Class F must be restricted to service representatives and system administrators only.
The IBM z/VM ANY Privilege Class must not be listed for privilege commands.
The Mainframe Product must prevent non-privileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures.
Microsoft Android 11 must be configured to enable encryption for data at rest on removable storage media or alternately, the use of removable storage media must be disabled.
The mobile operating system must allow only the Administrator (MDM) to perform the following management function: Enable/disable location services.
Azure SQL Database must prevent nonprivileged users from executing privileged functions, to include disabling, circumventing, or altering implemented security safeguards/countermeasures.
Connection verification of permissions must be enforced.
SharePoint must prevent non-privileged users from circumventing malicious code protection capabilities.
SQL Server must prevent non-privileged users from executing privileged functionality, to include disabling, circumventing, or altering implemented security safeguards/countermeasures.
ONTAP must prevent non-privileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures.
The network device must prevent non-privileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures.
Nutanix AOS must prevent nonprivileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures.
Non-privileged accounts on the hosting system must only access OHS security-relevant information and functions through a distinct administrative account.
Users requiring access to Prisma Cloud Compute's Credential Store must be assigned and accessed by the appropriate role holders.
Samsung Android must be configured to enable encryption for data at rest on removable storage media or, alternately, the use of removable storage media must be disabled.
All Active Directory accounts synchronized with Tanium for non-privileged functions must be non-privileged domain accounts.
The TippingPoint SMS must be configured to use an authentication server for the purpose of authenticating users prior to granting administrative access and to enforce access restrictions.
$CATALINA_HOME/bin folder permissions must be set to 750.
Tomcat user account must be set to nologin.
Tomcat user account must be a non-privileged user.
Apple iOS/iPadOS 17 must be configured to disable "Auto Unlock" of the iPhone by an Apple Watch.
Apple iOS/iPadOS 16 must be configured to disable Auto Unlock of the iPhone by an Apple Watch.
The macOS system must prevent nonprivileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures.
The macOS system must require administrator privileges to modify systemwide settings.
Pam_Apparmor must be configured to allow system administrators to pass information to any other Ubuntu operating system administrator or user, change security attributes, and to confine all non-privileged users from executing functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures.
The Ubuntu operating system must be configured to use AppArmor.
PostgreSQL must prevent non-privileged users from executing privileged functions, to include disabling, circumventing, or altering implemented security safeguards/countermeasures.
The Cisco ISE must prevent non-privileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures.
The container platform must prevent non-privileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures.
The EDB Postgres Advanced Server must prevent nonprivileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures.
The DBMS must prevent non-privileged users from executing privileged functions, to include disabling, circumventing, or altering implemented security safeguards/countermeasures.
Google Android 14 must be configured to disable all data signaling over [assignment: list of externally accessible hardware ports (for example, USB)].
The operating system must prevent nonprivileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures.
SSMC must prevent nonprivileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures.
CA-ACF2 must limit access to SYS(x).TRACE to system programmers only.
CA-ACF2 allocate access to system user catalogs must be properly protected.
IBM z/OS must protect dynamic lists in accordance with proper security requirements.
IBM z/OS Libraries included in the system REXXLIB concatenation must be properly protected.
CA-ACF2 must limit Write or greater access to SYS1.UADS To system programmers only and read and update access must be limited to system programmer personnel and/or security personnel.
CA-ACF2 must limit all system PROCLIB data sets to appropriate authorized users.
IBM z/OS MCS consoles access authorization(s) for CONSOLE resource(s) must be properly protected.
CA-ACF2 must limit Write or greater access to SYS1.NUCLEUS to system programmers only.
CA-ACF2 must limit Write or greater access to SYS1.LPALIB to system programmers only.
CA-ACF2 must limit Write or greater access to SYS1.IMAGELIB to system programmers.
CA-ACF2 must limit Write or greater access to Libraries containing EXIT modules to system programmers only.
CA-ACF2 must limit Write and Allocate access to all APF-authorized libraries to system programmers only.
CA-ACF2 must limit Write or greater access to all LPA libraries to system programmers only.
CA-ACF2 must limit Write and Allocate access to LINKLIST libraries to system programmers only.
CA-ACF2 must limit Write and allocate access to all system-level product installation libraries to system programmers only.
CA-ACF2 must limit Write or greater access to SYS1.SVCLIB to system programmers only.
CA-ACF2 Access to SYS1.LINKLIB must be properly protected.
CA-ACF2 must limit access to data sets used to back up and/or dump SMF collection files to appropriate users and/or batch jobs that perform SMF dump processing.
CA-ACF2 LOGONIDs must not be defined to SYS1.UADS for non-emergency use.
IBM z/OS IEASYMUP resource must be protected in accordance with proper security requirements.
CA-ACF2 must limit Update and Allocate access to system backup files to system programmers and/or batch jobs that perform DASD backups.
ACF2 PPGM GSO record value must specify protected programs that are only executed by privileged users.
IBM z/OS SYS1.PARMLIB must be properly protected.
CA-ACF2 must limit Write and allocate access to the JES2 System data sets (e.g., Spool, Checkpoint, and Initialization parameters) to system programmers only.
CA-ACF2 must limit Write or greater access to libraries that contain PPT modules to system programmers only.
IBM z/OS must limit access for SMF collection files (i.e., SYS1.MANx) to appropriate users and/or batch jobs that perform SMF dump processing.
CA-TSS must limit Write or greater access to SYS1.SVCLIB to system programmers only.
CA-TSS must limit Write or greater access to SYS1.IMAGELIB to system programmers only.
CA-TSS must limit Write or greater access to SYS1.LPALIB to system programmers only.
CA-TSS must limit WRITE or greater access to all APF-authorized libraries to system programmers only.
IBM z/OS libraries included in the system REXXLIB concatenation must be properly protected.
CA-TSS must limit Write or greater access to all LPA libraries to system programmers only.
CA-TSS must limit Write or greater access to SYS1.NUCLEUS to system programmers only.
CA-TSS must limit Write or greater access to libraries that contain PPT modules to system programmers only.
CA-TSS must limit WRITE or greater access to LINKLIST libraries to system programmers only.
CA-TSS security data sets and/or databases must be properly protected.
CA-TSS must limit access to the System Master Catalog to appropriate authorized users.
CA-TSS must limit WRITE or greater access to all system-level product installation libraries to system programmers only.
CA-TSS must limit WRITE or greater access to the JES2 System data sets (e.g., Spool, Checkpoint, and Initialization parameters) to system programmers only.
CA-TSS must limit Write or greater access to SYS1.UADS to system programmers only, and Read and Update access must be limited to system programmer personnel and/or security personnel.
CA-TSS must limit access to data sets used to back up and/or dump SMF collection files to appropriate users and/or batch jobs that perform SMF dump processing.
CA-TSS must limit access to SYSTEM DUMP data sets to system programmers only.
ACF2 security data sets and/or databases must be properly protected.
IBM z/OS SMF collection files (i.e., SYS1.MANx) access must be limited to appropriate users and/or batch jobs that perform SMF dump processing.
IBM z/OS DFSMS resources must be protected in accordance with the proper security requirements.
IBM z/OS UNIX MVS data sets used as step libraries in /etc/steplib must be properly protected.
IBM RACF must limit Write or greater access to SYS1.NUCLEUS to system programmers only.
IBM RACF must limit Write or greater access to libraries that contain PPT modules to system programmers only.
IBM RACF access to the System Master Catalog must be properly protected.
IBM RACF must limit Write or greater access to SYS1.UADS to system programmers only, and WRITE or greater access must be limited to system programmer personnel and/or security personnel.
IBM RACF allocate access to system user catalogs must be properly protected.
IBM RACF must limit WRITE or greater access to System backup files to system programmers and/or batch jobs that perform DASD backups.
IBM RACF must limit access to SYS(x).TRACE to system programmers only.
IBM RACF must limit Write or greater access to SYS1.SVCLIB to appropriate authorized users.
IBM RACF must limit Write or greater access to SYS1.LPALIB to system programmers only.
IBM RACF must limit write or greater access to all LPA libraries to system programmers only.
IBM RACF must limit Write or greater access to libraries containing EXIT modules to system programmers only.
IBM RACF must limit WRITE or greater access to all system-level product installation libraries to system programmers.
IBM RACF must limit access to SYSTEM DUMP data sets to system programmers only.
IBM RACF must limit WRITE or greater access to all APF-authorized libraries to system programmers only.
IBM RACF access to SYS1.LINKLIB must be properly protected.
IBM RACF security data sets and/or databases must be properly protected.
IBM RACF must limit access to data sets used to back up and/or dump SMF collection files to appropriate users and/or batch jobs that perform SMF dump processing.
IBM RACF must limit all system PROCLIB data sets to system programmers only.
IBM RACF must limit access to System page data sets (i.e., PLPA, COMMON, and LOCALx) to system programmers.
IBM RACF must limit WRITE or greater access to the JES2 System data sets (e.g., Spool, Checkpoint, and Initialization parameters) to system programmers only.
The IBM z/OS IEASYMUP resource must be protected in accordance with proper security requirements.
CA-TSS WRITE or Greater access to System backup files must be limited to system programmers and/or batch jobs that perform DASD backups.
CA-TSS must limit access to SYS(x).TRACE to system programmers only.
CA-TSS must limit access to System page data sets (i.e., PLPA, COMMON, and LOCALx) to system programmers only.
CA-TSS must limit WRITE or greater access to libraries containing EXIT modules to system programmers only.
CA-TSS must limit all system PROCLIB data sets to system programmers only and appropriate authorized users.
CA-TSS Default ACID must be properly defined.
The CA-TSS BYPASS attribute must be limited to trusted STCs only.
CA-TSS MSCA ACID must perform security administration only.
CA-TSS ACIDs granted the CONSOLE attribute must be justified.
CA-TSS ACIDs defined as security administrators must have the NOATS attribute.
CA-TSS LOGONIDs must not be defined to SYS1.UADS for non-emergency use.
IBM RACF LOGONIDs must not be defined to SYS1.UADS for non-emergency use.
IBM RACF must limit WRITE or greater access to LINKLIST libraries to system programmers only.
The ICS must be configured to prevent nonprivileged users from executing privileged functions.
The Juniper EX switch must prevent nonprivileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures.
MarkLogic Server must prevent non-privileged users from executing privileged functions, to include disabling, circumventing, or altering implemented security safeguards/countermeasures.
MariaDB must prevent nonprivileged users from executing privileged functions, to include disabling, circumventing, or altering implemented security safeguards/countermeasures.
MongoDB must enforce discretionary access control policies, as defined by the data owner, over defined subjects and objects.
Role-Based Access Control must be defined for privileged and nonprivileged users.
Users must be prevented from creating new trusted locations in the Trust Center.
IIS 10.0 web server system files must conform to minimum file permission requirements.
Only accounts responsible for the administration of a system must have Administrator rights on the system.
Outlook must be configured to prevent users overriding attachment security settings.
SQL Server must prevent non-privileged users from executing privileged functions, to include disabling, circumventing, or altering implemented security safeguards/countermeasures.
Default permissions for the HKEY_LOCAL_MACHINE registry hive must be maintained.
Remote calls to the Security Account Manager (SAM) must be restricted to Administrators.
The Access Credential Manager as a trusted caller user right must not be assigned to any groups or accounts.
The Act as part of the operating system user right must not be assigned to any groups or accounts.
The Back up files and directories user right must only be assigned to the Administrators group.
The Change the system time user right must only be assigned to Administrators and Local Service and NT SERVICE\autotimesvc.
The Create a pagefile user right must only be assigned to the Administrators group.
The Create a token object user right must not be assigned to any groups or accounts.
The Create global objects user right must only be assigned to Administrators, Service, Local Service, and Network Service.
The Create permanent shared objects user right must not be assigned to any groups or accounts.
The Create symbolic links user right must only be assigned to the Administrators group.
The Debug programs user right must only be assigned to the Administrators group.
The Enable computer and user accounts to be trusted for delegation user right must not be assigned to any groups or accounts.
The Force shutdown from a remote system user right must only be assigned to the Administrators group.
The Impersonate a client after authentication user right must only be assigned to Administrators, Service, Local Service, and Network Service.
The Load and unload device drivers user right must only be assigned to the Administrators group.
The Lock pages in memory user right must not be assigned to any groups or accounts.
The Modify firmware environment values user right must only be assigned to the Administrators group.
The Perform volume maintenance tasks user right must only be assigned to the Administrators group.
The Profile single process user right must only be assigned to the Administrators group.
The Restore files and directories user right must only be assigned to the Administrators group.
The Take ownership of files or other objects user right must only be assigned to the Administrators group.
The "Access Credential Manager as a trusted caller" user right must not be assigned to any groups or accounts.
The "Act as part of the operating system" user right must not be assigned to any groups or accounts.
The "Back up files and directories" user right must only be assigned to the Administrators group.
The "Change the system time" user right must only be assigned to Administrators and Local Service.
The "Create a pagefile" user right must only be assigned to the Administrators group.
The "Create a token object" user right must not be assigned to any groups or accounts.
The "Create global objects" user right must only be assigned to Administrators, Service, Local Service, and Network Service.
The "Create permanent shared objects" user right must not be assigned to any groups or accounts.
The "Create symbolic links" user right must only be assigned to the Administrators group.
The "Debug programs" user right must only be assigned to the Administrators group.
The "Enable computer and user accounts to be trusted for delegation" user right must not be assigned to any groups or accounts.
The "Force shutdown from a remote system" user right must only be assigned to the Administrators group.
The "Impersonate a client after authentication" user right must only be assigned to Administrators, Service, Local Service, and Network Service.
The "Load and unload device drivers" user right must only be assigned to the Administrators group.
The "Lock pages in memory" user right must not be assigned to any groups or accounts.
The "Modify firmware environment values" user right must only be assigned to the Administrators group.
The "Perform volume maintenance tasks" user right must only be assigned to the Administrators group.
The "Profile single process" user right must only be assigned to the Administrators group.
The "Restore files and directories" user right must only be assigned to the Administrators group.
The "Take ownership of files or other objects" user right must only be assigned to the Administrators group.
Only administrators responsible for the domain controller must have Administrator rights on the system.
Permissions on the Active Directory data files must only allow System and Administrators access.
The Active Directory SYSVOL directory must have the proper access control permissions.
Active Directory Group Policy objects must have proper access control permissions.
The Active Directory Domain Controllers Organizational Unit (OU) object must have the proper access control permissions.
Domain-created Active Directory Organizational Unit (OU) objects must have proper access control permissions.
The Add workstations to domain user right must only be assigned to the Administrators group.
The Enable computer and user accounts to be trusted for delegation user right must only be assigned to the Administrators group on domain controllers.
Only administrators responsible for the member server or standalone or nondomain-joined system must have Administrator rights on the system.
The "Enable computer and user accounts to be trusted for delegation" user right must not be assigned to any groups or accounts on member servers.
The Generate security audits user right must only be assigned to Local Service and Network Service.
The Increase scheduling priority user right must only be assigned to the Administrators group.
Windows Server 2019 default permissions for the HKEY_LOCAL_MACHINE registry hive must be maintained.
Windows Server 2019 must only allow administrators responsible for the domain controller to have Administrator rights on the system.
Windows Server 2019 permissions on the Active Directory data files must only allow System and Administrators access.
Windows Server 2019 Active Directory SYSVOL directory must have the proper access control permissions.
Windows Server 2019 Active Directory Group Policy objects must have proper access control permissions.
Windows Server 2019 Active Directory Domain Controllers Organizational Unit (OU) object must have the proper access control permissions.
Windows Server 2019 organization created Active Directory Organizational Unit (OU) objects must have proper access control permissions.
Windows Server 2019 Add workstations to domain user right must only be assigned to the Administrators group on domain controllers.
Windows Server 2019 Enable computer and user accounts to be trusted for delegation user right must only be assigned to the Administrators group on domain controllers.
Windows Server 2019 must only allow Administrators responsible for the member server or standalone or nondomain-joined system to have Administrator rights on the system.
Windows Server 2019 must restrict remote calls to the Security Account Manager (SAM) to Administrators on domain-joined member servers and standalone or nondomain-joined systems.
Windows Server 2019 "Enable computer and user accounts to be trusted for delegation" user right must not be assigned to any groups or accounts on domain-joined member servers and standalone or nondomain-joined systems.
Windows Server 2019 Access Credential Manager as a trusted caller user right must not be assigned to any groups or accounts.
Windows Server 2019 Act as part of the operating system user right must not be assigned to any groups or accounts.
Windows Server 2019 Back up files and directories user right must only be assigned to the Administrators group.
Windows Server 2019 Create a pagefile user right must only be assigned to the Administrators group.
Windows Server 2019 Create a token object user right must not be assigned to any groups or accounts.
Windows Server 2019 Create global objects user right must only be assigned to Administrators, Service, Local Service, and Network Service.
Windows Server 2019 Create permanent shared objects user right must not be assigned to any groups or accounts.
Windows Server 2019 Create symbolic links user right must only be assigned to the Administrators group.
Windows Server 2019 Debug programs: user right must only be assigned to the Administrators group.
Windows Server 2019 Force shutdown from a remote system user right must only be assigned to the Administrators group.
Windows Server 2019 Generate security audits user right must only be assigned to Local Service and Network Service.
Windows Server 2019 Impersonate a client after authentication user right must only be assigned to Administrators, Service, Local Service, and Network Service.
Windows Server 2019 Increase scheduling priority: user right must only be assigned to the Administrators group.
Windows Server 2019 Load and unload device drivers user right must only be assigned to the Administrators group.
Windows Server 2019 Lock pages in memory user right must not be assigned to any groups or accounts.
Windows Server 2019 Modify firmware environment values user right must only be assigned to the Administrators group.
Windows Server 2019 Perform volume maintenance tasks user right must only be assigned to the Administrators group.
Windows Server 2019 Profile single process user right must only be assigned to the Administrators group.
Windows Server 2019 Restore files and directories user right must only be assigned to the Administrators group.
Windows Server 2019 Take ownership of files or other objects user right must only be assigned to the Administrators group.
Windows Server 2022 default permissions for the HKEY_LOCAL_MACHINE registry hive must be maintained.
Windows Server 2022 must only allow administrators responsible for the domain controller to have Administrator rights on the system.
Windows Server 2022 permissions on the Active Directory data files must only allow System and Administrators access.
Windows Server 2022 Active Directory SYSVOL directory must have the proper access control permissions.
Windows Server 2022 Active Directory Group Policy objects must have proper access control permissions.
Windows Server 2022 Active Directory Domain Controllers Organizational Unit (OU) object must have the proper access control permissions.
Windows Server 2022 organization created Active Directory Organizational Unit (OU) objects must have proper access control permissions.
Windows Server 2022 Add workstations to domain user right must only be assigned to the Administrators group on domain controllers.
Windows Server 2022 Enable computer and user accounts to be trusted for delegation user right must only be assigned to the Administrators group on domain controllers.
Windows Server 2022 must only allow administrators responsible for the member server or standalone or nondomain-joined system to have Administrator rights on the system.
Windows Server 2022 must restrict remote calls to the Security Account Manager (SAM) to Administrators on domain-joined member servers and standalone or nondomain-joined systems.
Windows Server 2022 Enable computer and user accounts to be trusted for delegation user right must not be assigned to any groups or accounts on domain-joined member servers and standalone or nondomain-joined systems.
Windows Server 2022 Access Credential Manager as a trusted caller user right must not be assigned to any groups or accounts.
Windows Server 2022 Act as part of the operating system user right must not be assigned to any groups or accounts.
Windows Server 2022 back up files and directories user right must only be assigned to the Administrators group.
Windows Server 2022 create a pagefile user right must only be assigned to the Administrators group.
Windows Server 2022 create a token object user right must not be assigned to any groups or accounts.
Windows Server 2022 create global objects user right must only be assigned to Administrators, Service, Local Service, and Network Service.
Windows Server 2022 create permanent shared objects user right must not be assigned to any groups or accounts.
Windows Server 2022 create symbolic links user right must only be assigned to the Administrators group.
Windows Server 2022 debug programs user right must only be assigned to the Administrators group.
Windows Server 2022 force shutdown from a remote system user right must only be assigned to the Administrators group.
Windows Server 2022 generate security audits user right must only be assigned to Local Service and Network Service.
Windows Server 2022 impersonate a client after authentication user right must only be assigned to Administrators, Service, Local Service, and Network Service.
Windows Server 2022 increase scheduling priority: user right must only be assigned to the Administrators group.
Windows Server 2022 load and unload device drivers user right must only be assigned to the Administrators group.
Windows Server 2022 lock pages in memory user right must not be assigned to any groups or accounts.
Windows Server 2022 modify firmware environment values user right must only be assigned to the Administrators group.
Windows Server 2022 perform volume maintenance tasks user right must only be assigned to the Administrators group.
Windows Server 2022 profile single process user right must only be assigned to the Administrators group.
Windows Server 2022 restore files and directories user right must only be assigned to the Administrators group.
Windows Server 2022 take ownership of files or other objects user right must only be assigned to the Administrators group.
The Oracle Linux operating system must prevent nonprivileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures.
The Oracle Linux operating system must confine SELinux users to roles that conform to least privilege.
The Oracle Linux operating system must not allow privileged accounts to utilize SSH.
The Oracle Linux operating system must elevate the SELinux context when an administrator calls the sudo command.
OL 8 must prevent nonprivileged users from executing privileged functions, including disabling, circumventing, or altering implemented security safeguards/countermeasures.
The MySQL Database Server 8.0 must prevent non-privileged users from executing privileged functions, to include disabling, circumventing, or altering implemented security safeguards/countermeasures.
Redis Enterprise DBMS must prevent non-privileged users from executing privileged functions, to include disabling, circumventing, or altering implemented security safeguards/countermeasures.
Rancher RKE2 must prevent nonprivileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures.
OpenShift RBAC access controls must be enforced.
Nonprivileged accounts on the hosting system must only access Automation Controller NGINX web server security-relevant information and functions through a distinct administrative account.
The Red Hat Enterprise Linux operating system must be configured so that the file permissions, ownership, and group membership of system files and commands match the vendor values.
The Red Hat Enterprise Linux operating system must prevent nonprivileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures.
The Red Hat Enterprise Linux operating system must confine SELinux users to roles that conform to least privilege.
The Red Hat Enterprise Linux operating system must not allow privileged accounts to utilize SSH.
The Red Hat Enterprise Linux operating system must elevate the SELinux context when an administrator calls the sudo command.
The systemd Ctrl-Alt-Delete burst key sequence in RHEL 9 must be disabled.
The x86 Ctrl-Alt-Delete key sequence must be disabled on RHEL 9.
RHEL 9 debug-shell systemd service must be disabled.
RHEL 9 must enable kernel parameters to enforce discretionary access control on hardlinks.
RHEL 9 must enable kernel parameters to enforce discretionary access control on symlinks.
The SUSE operating system Apparmor tool must be configured to control whitelisted applications and user home directory access control.
SUSE operating system AppArmor tool must be configured to control whitelisted applications and user home directory access control.
RHEL 9 must prevent users from disabling session control mechanisms.
RHEL 9 must have the sudo package installed.
The operating system must prevent non-privileged users from circumventing malicious code protection capabilities.
The system must restrict the ability of users to assume excessive privileges to members of a defined group and prevent unauthorized users from accessing administrative tools.
The Samsung Android device must be configured to disable all data signaling over [assignment: list of externally accessible hardware ports (for example, USB)].
The VMM must prevent non-privileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures.
The Photon operating system must enable symlink access control protection in the kernel.
Non-privileged accounts on the hosting system must only access web server security-relevant information and functions through a distinct administrative account.
Sensitive CICS transactions are not protected in accordance with the proper security requirements.
The EDB Postgres Advanced Server must prevent non-privileged users from executing privileged functions, to include disabling, circumventing, or altering implemented security safeguards/countermeasures.
The macOS system must require an administrator password to modify systemwide preferences.
Ubuntu 22.04 LTS must be configured to use AppArmor.
PostgreSQL must prevent nonprivileged users from executing privileged functions, to include disabling, circumventing, or altering implemented security safeguards/countermeasures.
Dragos Platforms must limit privileges and not allow the ability to run shell.
Google Android 15 must be configured to disable all data signaling over [assignment: list of externally accessible hardware ports (for example, USB)].
Product engineering access to the Hardware Management Console must be disabled.
zSecure must prevent nonprivileged users from executing privileged zSecure functions.
MongoDB must prevent nonprivileged users from executing privileged functions, to include disabling, circumventing, or altering implemented security safeguards/countermeasures.
SLEM 5 must use a Linux Security Module configured to enforce limits on system services.
The NSX Manager must assign users/accounts to organization-defined roles configured with approved authorizations.
TOSS must enable kernel parameters to enforce discretionary access control on symlinks.
TOSS must enable kernel parameters to enforce discretionary access control on hardlinks.
Apple iOS/iPadOS 18 must be configured to disable "Auto Unlock" of the iPhone by an Apple Watch.