Capacity
CCI-002696
Verify correct operation of organization-defined security functions.
Choose one
26
Rule
Severity: Medium
Install AIDE
30
Rule
Severity: High
Ensure SELinux State is Enforcing
18
Rule
Severity: Medium
Configure SELinux Policy
2
Rule
Severity: Medium
The application performing organization-defined security functions must verify correct operation of security functions.
1
Rule
Severity: Medium
The IBM Aspera High-Speed Transfer Server must configure the SELinux context type to allow the "aspshell".
1
Rule
Severity: Medium
The Ivanti MobileIron Core server must be configured with the periodicity of the following commands to the agent of six hours or less: - query connectivity status - query the current version of the managed device firmware/software - query the current version of installed mobile applications - read audit logs kept by the managed device.
2
Rule
Severity: Medium
The Mainframe Product performing organization-defined security functions must verify correct operation of security functions.
1
Rule
Severity: Medium
The MobileIron Core v10 server must be configured with a periodicity for reachable events of six hours or less for the following commands to the agent: - query connectivity status; - query the current version of the MD firmware/software; - query the current version of the hardware model of the device; - query the current version of installed mobile applications; - read audit logs kept by the MD.
1
Rule
Severity: Medium
Nutanix AOS must be configured to use SELinux Enforcing mode.
2
Rule
Severity: High
The configuration integrity of the container platform must be ensured and compliance policies must be configured.
1
Rule
Severity: Medium
The Samsung SDS EMM must be configured with a periodicity for reachable events of six hours or less for the following commands to the agent:
- query connectivity status;
- query the current version of the MD firmware/software;
- query the current version of installed mobile applications;
- read audit logs kept by the MD.
2
Rule
Severity: Medium
The UEM server must be configured with the periodicity of the following commands to the agent of six hours or less: - query connectivity status - query the current version of the managed device firmware/software - query the current version of installed mobile applications - read audit logs kept by the managed device.
1
Rule
Severity: Medium
The Workspace ONE UEM server must be configured with a periodicity for reachable events of six hours or less for the following commands to the agent:
- query connectivity status;
- query the current version of the MD firmware/software;
- query the current version of installed mobile applications;
- read audit logs kept by the MD.
2
Rule
Severity: Medium
The macOS system must ensure secure boot level set to full.
3
Rule
Severity: Medium
The Ubuntu operating system must use a file integrity tool to verify correct operation of all security functions.
2
Rule
Severity: Medium
The organization-defined role must verify correct operation of security functions in the container platform.
2
Rule
Severity: Medium
The operating system must verify correct operation of all security functions.
2
Rule
Severity: Medium
The Oracle Linux operating system must enable SELinux.
2
Rule
Severity: Medium
The Oracle Linux operating system must enable the SELinux targeted policy.
2
Rule
Severity: Medium
The Oracle Linux operating system must use a file integrity tool to verify correct operation of all security functions.
2
Rule
Severity: Medium
OL 8 must enable the SELinux targeted policy.
2
Rule
Severity: Medium
The OL 8 operating system must use a file integrity tool to verify correct operation of all security functions.
2
Rule
Severity: Medium
The Compliance Operator must be configured.
1
Rule
Severity: Medium
The Red Hat Enterprise Linux operating system must enable SELinux.
1
Rule
Severity: Medium
The Red Hat Enterprise Linux operating system must enable the SELinux targeted policy.
2
Rule
Severity: Medium
RHEL 8 must enable the SELinux targeted policy.
1
Rule
Severity: Medium
The Red Hat Enterprise Linux operating system must use a file integrity tool to verify correct operation of all security functions.
4
Rule
Severity: Medium
Advanced Intrusion Detection Environment (AIDE) must verify the baseline SUSE operating system configuration at least weekly.
2
Rule
Severity: Medium
The RHEL 8 operating system must use a file integrity tool to verify correct operation of all security functions.
4
Rule
Severity: Medium
The SUSE operating system must use a file integrity tool to verify correct operation of all security functions.
2
Rule
Severity: High
RHEL 9 must use a Linux Security Module configured to enforce limits on system services.
2
Rule
Severity: Medium
RHEL 9 must enable the SELinux targeted policy.
2
Rule
Severity: Medium
RHEL 9 must have the AIDE package installed.
4
Rule
Severity: Medium
The operating system must verify the correct operation of security functions in accordance with organization-defined conditions and in accordance with organization-defined frequency (if periodic verification).
4
Rule
Severity: Medium
The operating system must identify potentially security-relevant error conditions.
2
Rule
Severity: Medium
The VMM must verify correct operation of all security functions.
3
Rule
Severity: Medium
The ESXi host must implement Secure Boot enforcement.
1
Rule
Severity: Medium
The Photon operating system must have the auditd service running.
1
Rule
Severity: Medium
The macOS system must ensure Secure Boot level is set to "full".
1
Rule
Severity: Medium
Ubuntu 22.04 LTS must use a file integrity tool to verify correct operation of all security functions.
1
Rule
Severity: Medium
Ubuntu 22.04 LTS must configure AIDE to perform file integrity checking on the file system.
1
Rule
Severity: Medium
The Ivanti EPMM server must be configured with the periodicity of the following commands to the agent of six hours or less: - query connectivity status - query the current version of the managed device firmware/software - query the current version of installed mobile applications - read audit logs kept by the managed device.
1
Rule
Severity: Medium
SLEM 5 must enable the SELinux targeted policy.
1
Rule
Severity: Medium
Advanced Intrusion Detection Environment (AIDE) must verify the baseline SLEM 5 configuration at least weekly.
1
Rule
Severity: Medium
TOSS must enable the "SELinux" targeted policy.
Patternfly
PatternFly elements
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.
Modules
66%