Capacity
CCI-002530
Maintain a separate execution domain for each executing system process.
Choose one
12
Rule
Severity: Medium
Enable ExecShield via sysctl
1
Rule
Severity: Medium
Adobe Acrobat Pro DC Continuous Enhanced Security for browser mode must be enabled.
1
Rule
Severity: Medium
Adobe Acrobat Pro DC Continuous Protected Mode must be enabled.
1
Rule
Severity: Medium
Adobe Acrobat Pro DC Continuous Protected View must be enabled.
1
Rule
Severity: Medium
Apple iOS/iPadOS 15 must not allow non-DoD applications to access DoD data.
2
Rule
Severity: Medium
The application must maintain a separate execution domain for each executing process.
2
Rule
Severity: Medium
CA IDMS must protect the system code and storage from corruption by user programs.
2
Rule
Severity: Medium
CA IDMS must protect system and user code and storage from corruption by user programs.
2
Rule
Severity: Medium
CA IDMS must prevent user code from issuing selected SVC privileged functions.
1
Rule
Severity: Medium
Google Android 12 must be configured to disable exceptions to the access control policy that prevent [selection: application processes, groups of application processes] from accessing [selection: all, private] data stored by other [selection: application processes, groups of application processes].
4
Rule
Severity: Medium
Google Android 13 must be configured to disable exceptions to the access control policy that prevent [selection: application processes, groups of application processes] from accessing [selection: all, private] data stored by other [selection: application processes, groups of application processes].
2
Rule
Severity: Medium
The Mainframe Product must maintain a separate execution domain for each executing process.
1
Rule
Severity: Medium
Microsoft Android 11 must be configured to disable exceptions to the access control policy that prevent application processes from accessing all data stored by other application processes.
5
Rule
Severity: Medium
Exchange software must be installed on a separate partition from the OS.
2
Rule
Severity: Medium
The Exchange Email application must not share a partition with another application.
2
Rule
Severity: Medium
Prisma Cloud Compute must run within a defined/separate namespace (e.g., Twistlock).
3
Rule
Severity: Medium
Samsung Android's Work profile must be configured to disable exceptions to the access control policy that prevent application processes, and groups of application processes from accessing all data stored by other application processes, and groups of application processes.
1
Rule
Severity: Medium
Apple iOS/iPadOS 16 must not allow non-DOD applications to access DOD data.
1
Rule
Severity: Medium
Apple iOS/iPadOS 16 must not allow DOD applications to access non-DOD data.
3
Rule
Severity: Medium
Apple iOS/iPadOS 17 must not allow non-DOD applications to access DOD data.
2
Rule
Severity: Medium
Apple iOS/iPadOS 16 must not allow non-DoD applications to access DoD data.
2
Rule
Severity: Medium
The container platform runtime must maintain separate execution domains for each container by assigning each container a separate address space.
2
Rule
Severity: Medium
The DBMS must maintain a separate execution domain for each executing process.
3
Rule
Severity: Medium
Google Android 14 must be configured to disable exceptions to the access control policy that prevent [selection: application processes, groups of application processes] from accessing [selection: all, private] data stored by other [selection: application processes, groups of application processes].
2
Rule
Severity: Medium
Trust must be established prior to enabling the loading of remote code in .Net 4.
2
Rule
Severity: Medium
Software utilizing .Net 4.0 must be identified and relevant access controls configured.
2
Rule
Severity: Medium
The Exchange email application must not share a partition with another application.
2
Rule
Severity: Medium
SQL Server must maintain a separate execution domain for each executing process.
2
Rule
Severity: Medium
SQL Server services must be configured to run under unique dedicated user accounts.
2
Rule
Severity: Medium
Rancher RKE2 runtime must maintain separate execution domains for each container by assigning each container a separate address space to prevent unauthorized and unintended information transfer via shared system resources.
3
Rule
Severity: Medium
Samsung Android's Work profile must be configured to disable exceptions to the access control policy that prevent application processes and groups of application processes from accessing all data stored by other application processes and groups of application processes.
2
Rule
Severity: Medium
The VMM must maintain a separate execution domain for each executing process.
2
Rule
Severity: Medium
The VMM must maintain a separate execution domain for each guest VM.
1
Rule
Severity: Medium
Apple iOS/iPadOS 17 must not allow DOD applications to access non-DOD data.
1
Rule
Severity: Medium
Google Android 15 must be configured to disable exceptions to the access control policy that prevent [selection: application processes, groups of application processes] from accessing [selection: all, private] data stored by other [selection: application processes, groups of application processes].
1
Rule
Severity: Medium
CPU priority must be set appropriately on all containers.
1
Rule
Severity: Medium
Host IPC namespace must not be shared.
1
Rule
Severity: Medium
Apple iOS/iPadOS 18 must not allow non-DOD applications to access DOD data.
Patternfly
PatternFly elements
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.
Modules
66%