| ALMA-09-006180 | V1R5 | AlmaLinux OS 9 must require authentication to access emergency mode. | AlmaLinux OS 9 |
| ALMA-09-006290 | V1R5 | AlmaLinux OS 9 must require a boot loader password. | AlmaLinux OS 9 |
| ALMA-09-006400 | V1R5 | AlmaLinux OS 9 must require a unique superuser's name upon booting into single-user and maintenance modes. | AlmaLinux OS 9 |
| ALMA-09-006510 | V1R5 | AlmaLinux OS 9 must require authentication to access single-user mode. | AlmaLinux OS 9 |
| APPL-14-000033 | V2R4 | The macOS system must disable FileVault automatic log on. | macOS 14 - Sonoma |
| APPL-14-002001 | V2R4 | The macOS system must disable Server Message Block sharing. | macOS 14 - Sonoma |
| APPL-14-002003 | V2R4 | The macOS system must disable Network File System service. | macOS 14 - Sonoma |
| APPL-14-002006 | V2R4 | The macOS system must disable Unix-to-Unix Copy Protocol service. | macOS 14 - Sonoma |
| APPL-14-002008 | V2R4 | The macOS system must disable the built-in web server. | macOS 14 - Sonoma |
| APPL-14-002009 | V2R4 | The macOS system must disable AirDrop. | macOS 14 - Sonoma |
| APPL-14-002022 | V2R4 | The macOS system must disable Remote Apple Events. | macOS 14 - Sonoma |
| APPL-14-002050 | V2R4 | The macOS system must disable Screen Sharing and Apple Remote Desktop. | macOS 14 - Sonoma |
| APPL-14-002100 | V2R4 | The macOS system must disable Media Sharing. | macOS 14 - Sonoma |
| APPL-14-002110 | V2R4 | The macOS system must disable Bluetooth sharing. | macOS 14 - Sonoma |
| APPL-14-005058 | V2R4 | The macOS system must disable Handoff. | macOS 14 - Sonoma |
| APPL-14-005070 | V2R4 | The macOS system must enable Authenticated Root. | macOS 14 - Sonoma |
| APPL-15-000033 | V1R6 | The macOS system must disable FileVault automatic login. | macOS 15 - Sequoia |
| APPL-15-002001 | V1R6 | The macOS system must disable Server Message Block (SMB) sharing. | macOS 15 - Sequoia |
| APPL-15-002003 | V1R6 | The macOS system must disable Network File System (NFS) service. | macOS 15 - Sequoia |
| APPL-15-002006 | V1R6 | The macOS system must disable Unix-to-Unix Copy Protocol (UUCP) service. | macOS 15 - Sequoia |
| APPL-15-002008 | V1R6 | The macOS system must disable the built-in web server. | macOS 15 - Sequoia |
| APPL-15-002009 | V1R6 | The macOS system must disable AirDrop. | macOS 15 - Sequoia |
| APPL-15-002022 | V1R6 | The macOS system must disable Remote Apple Events. | macOS 15 - Sequoia |
| APPL-15-002050 | V1R6 | The macOS system must disable Screen Sharing and Apple Remote Desktop. | macOS 15 - Sequoia |
| APPL-15-002100 | V1R6 | The macOS system must disable Media Sharing. | macOS 15 - Sequoia |
| APPL-15-002110 | V1R6 | The macOS system must disable Bluetooth Sharing. | macOS 15 - Sequoia |
| APPL-15-005058 | V1R6 | The macOS system must disable Handoff. | macOS 15 - Sequoia |
| APPL-15-005070 | V1R6 | The macOS system must enable Authenticated Root. | macOS 15 - Sequoia |
| APPL-15-002271 | V1R6 | The macOS system must disable iPhone Mirroring. | macOS 15 - Sequoia |
| OL07-00-010481 | V3R5 | The Oracle Linux operating system must require authentication upon booting into single-user and maintenance modes. | Oracle Linux 7 |
| OL07-00-010482 | V3R5 | Oracle Linux operating systems version 7.2 or newer with a Basic Input/Output System (BIOS) must require authentication upon booting into single-user and maintenance modes. | Oracle Linux 7 |
| OL07-00-010491 | V3R5 | Oracle Linux operating systems version 7.2 or newer using Unified Extensible Firmware Interface (UEFI) must require authentication upon booting into single-user and maintenance modes. | Oracle Linux 7 |
| OL07-00-010483 | V3R5 | Oracle Linux operating systems version 7.2 or newer booted with a BIOS must have a unique name for the grub superusers account when booting into single-user and maintenance modes. | Oracle Linux 7 |
| OL07-00-010492 | V3R5 | Oracle Linux operating systems version 7.2 or newer booted with United Extensible Firmware Interface (UEFI) must have a unique name for the grub superusers account when booting into single-user mode and maintenance. | Oracle Linux 7 |
| OL08-00-010140 | V2R7 | OL 8 operating systems booted with United Extensible Firmware Interface (UEFI) must require authentication upon booting into single-user mode and maintenance. | Oracle Linux 8 |
| OL08-00-010141 | V2R7 | OL 8 operating systems booted with United Extensible Firmware Interface (UEFI) must have a unique name for the grub superusers account when booting into single-user mode and maintenance. | Oracle Linux 8 |
| OL08-00-010149 | V2R7 | OL 8 operating systems booted with a BIOS must have a unique name for the grub superusers account when booting into single-user and maintenance modes. | Oracle Linux 8 |
| OL08-00-010150 | V2R7 | OL 8 operating systems booted with a BIOS must require authentication upon booting into single-user and maintenance modes. | Oracle Linux 8 |
| OL08-00-010151 | V2R7 | OL 8 operating systems must require authentication upon booting into rescue mode. | Oracle Linux 8 |
| OL08-00-010152 | V2R7 | OL 8 operating systems must require authentication upon booting into emergency mode. | Oracle Linux 8 |
| OL09-00-000025 | V1R4 | OL 9 must require authentication to access emergency mode. | Oracle Linux 9 |
| OL09-00-000030 | V1R4 | OL 9 must require authentication to access single-user mode. | Oracle Linux 9 |
| OL09-00-000050 | V1R4 | OL 9 must require a unique superuser's name upon booting into single-user and maintenance modes. | Oracle Linux 9 |
| OL09-00-001115 | V1R4 | OL 9 must require a boot loader superuser password. | Oracle Linux 9 |
| RHEL-07-010481 | V3R9 | The Red Hat Enterprise Linux operating system must require authentication upon booting into single-user and maintenance modes. | Red Hat Enterprise Linux 7 |
| RHEL-07-010482 | V3R9 | Red Hat Enterprise Linux operating systems version 7.2 or newer with a Basic Input/Output System (BIOS) must require authentication upon booting into single-user and maintenance modes. | Red Hat Enterprise Linux 7 |
| RHEL-07-010491 | V3R9 | Red Hat Enterprise Linux operating systems version 7.2 or newer using Unified Extensible Firmware Interface (UEFI) must require authentication upon booting into single-user and maintenance modes. | Red Hat Enterprise Linux 7 |
| RHEL-07-010483 | V3R9 | Red Hat Enterprise Linux operating systems version 7.2 or newer booted with a BIOS must have a unique name for the grub superusers account when booting into single-user and maintenance modes. | Red Hat Enterprise Linux 7 |
| RHEL-07-010492 | V3R9 | Red Hat Enterprise Linux operating systems version 7.2 or newer booted with United Extensible Firmware Interface (UEFI) must have a unique name for the grub superusers account when booting into single-user mode and maintenance. | Red Hat Enterprise Linux 7 |
| RHEL-08-010140 | V2R6 | RHEL 8 operating systems booted with United Extensible Firmware Interface (UEFI) must require authentication upon booting into single-user mode and maintenance. | Red Hat Enterprise Linux 8 |
| RHEL-08-010150 | V2R6 | RHEL 8 operating systems booted with a BIOS must require authentication upon booting into single-user and maintenance modes. | Red Hat Enterprise Linux 8 |
| RHEL-08-010151 | V2R6 | RHEL 8 operating systems must require authentication upon booting into rescue mode. | Red Hat Enterprise Linux 8 |
| RHEL-08-010141 | V2R6 | RHEL 8 operating systems booted with United Extensible Firmware Interface (UEFI) must require a unique superusers name upon booting into single-user mode and maintenance. | Red Hat Enterprise Linux 8 |
| RHEL-08-010149 | V2R6 | RHEL 8 operating systems booted with a BIOS must require a unique superusers name upon booting into single-user and maintenance modes. | Red Hat Enterprise Linux 8 |
| RHEL-08-010152 | V2R6 | RHEL 8 operating systems must require authentication upon booting into emergency mode. | Red Hat Enterprise Linux 8 |
| RHEL-09-212010 | V2R7 | RHEL 9 must require a boot loader superuser password. | Red Hat Enterprise Linux 9 |
| RHEL-09-212020 | V2R7 | RHEL 9 must require a unique superusers name upon booting into single-user and maintenance modes. | Red Hat Enterprise Linux 9 |
| RHEL-09-611195 | V2R7 | RHEL 9 must require authentication to access emergency mode. | Red Hat Enterprise Linux 9 |
| RHEL-09-611200 | V2R7 | RHEL 9 must require authentication to access single-user mode. | Red Hat Enterprise Linux 9 |
| RHEL-09-232103 | V2R7 | RHEL 9 "/etc/audit/" must be owned by root. | Red Hat Enterprise Linux 9 |
| RHEL-09-232104 | V2R7 | RHEL 9 "/etc/audit/" must be group-owned by root. | Red Hat Enterprise Linux 9 |
| SLES-12-010430 | V3R4 | SUSE operating systems with a basic input/output system (BIOS) must require authentication upon booting into single-user and maintenance modes. | SUSE Linux Enterprise 12 |
| SLES-12-010440 | V3R4 | SUSE operating systems with Unified Extensible Firmware Interface (UEFI) implemented must require authentication upon booting into single-user mode and maintenance. | SUSE Linux Enterprise 12 |
| SLES-15-010190 | V2R4 | SUSE operating systems with a basic input/output system (BIOS) must require authentication upon booting into single-user and maintenance modes. | SUSE Linux Enterprise 15 |
| SLES-15-010200 | V2R4 | SUSE operating systems with Unified Extensible Firmware Interface (UEFI) implemented must require authentication upon booting into single-user mode and maintenance. | SUSE Linux Enterprise 15 |
| TOSS-04-010030 | V2R3 | TOSS must require authentication upon booting into emergency or rescue modes. | Tri-Lab Operating System Stack |
| UBTU-18-010000 | V2R15 | Ubuntu operating systems booted with a BIOS must require authentication upon booting into single-user and maintenance modes. | Ubuntu 18.04 |
| UBTU-18-010001 | V2R15 | Ubuntu operating systems booted with United Extensible Firmware Interface (UEFI) implemented must require authentication upon booting into single-user mode and maintenance. | Ubuntu 18.04 |
| UBTU-20-010009 | V2R3 | Ubuntu operating systems when booted must require authentication upon booting into single-user and maintenance modes. | Ubuntu 20.04 |
| UBTU-22-212010 | V2R7 | Ubuntu 22.04 LTS, when booted, must require authentication upon booting into single-user and maintenance modes. | Ubuntu 22.04 |
| UBTU-24-102000 | V1R1 | Ubuntu 24.04 LTS when booted must require authentication upon booting into single-user and maintenance modes. | Ubuntu 24.04 |
| WN10-00-000050 | V3R6 | Local volumes must be formatted using NTFS. | Microsoft Windows 10 |
| WN10-UR-000010 | V3R6 | The Access this computer from the network user right must only be assigned to the Administrators and Remote Desktop Users groups. | Microsoft Windows 10 |
| WN10-UR-000025 | V3R6 | The Allow log on locally user right must only be assigned to the Administrators and Users groups. | Microsoft Windows 10 |
| WN10-UR-000070 | V3R6 | The Deny access to this computer from the network user right on workstations must be configured to prevent access from highly privileged domain accounts and local accounts on domain systems and unauthenticated access on all systems. | Microsoft Windows 10 |
| WN10-UR-000075 | V3R6 | The "Deny log on as a batch job" user right on domain-joined workstations must be configured to prevent access from highly privileged domain accounts. | Microsoft Windows 10 |
| WN10-UR-000080 | V3R6 | The Deny log on as a service user right on Windows 10 domain-joined workstations must be configured to prevent access from highly privileged domain accounts. | Microsoft Windows 10 |
| WN10-UR-000085 | V3R6 | The Deny log on locally user right on workstations must be configured to prevent access from highly privileged domain accounts on domain systems and unauthenticated access on all systems. | Microsoft Windows 10 |
| WN10-UR-000090 | V3R6 | The Deny log on through Remote Desktop Services user right on Windows 10 workstations must at a minimum be configured to prevent access from highly privileged domain accounts and local accounts on domain systems and unauthenticated access on all systems. | Microsoft Windows 10 |
| WN11-00-000050 | V2R5 | Local volumes must be formatted using NTFS. | Microsoft Windows 11 |
| WN11-UR-000010 | V2R5 | The "Access this computer from the network" user right must only be assigned to the Administrators and Remote Desktop Users groups. | Microsoft Windows 11 |
| WN11-UR-000025 | V2R5 | The "Allow log on locally" user right must only be assigned to the Administrators and Users groups. | Microsoft Windows 11 |
| WN11-UR-000070 | V2R5 | The "Deny access to this computer from the network" user right on workstations must be configured to prevent access from highly privileged domain accounts and local accounts on domain systems and unauthenticated access on all systems. | Microsoft Windows 11 |
| WN11-UR-000075 | V2R5 | The "Deny log on as a batch job" user right on domain-joined workstations must be configured to prevent access from highly privileged domain accounts. | Microsoft Windows 11 |
| WN11-UR-000080 | V2R5 | The "Deny log on as a service" user right on Windows 11 domain-joined workstations must be configured to prevent access from highly privileged domain accounts. | Microsoft Windows 11 |
| WN11-UR-000085 | V2R5 | The "Deny log on locally" user right on workstations must be configured to prevent access from highly privileged domain accounts on domain systems and unauthenticated access on all systems. | Microsoft Windows 11 |
| WN11-UR-000090 | V2R5 | The "Deny log on through Remote Desktop Services" user right on Windows 11 workstations must be configured to prevent access from highly privileged domain accounts and local accounts on domain systems and unauthenticated access on all systems. | Microsoft Windows 11 |
| WN16-00-000150 | V2R9 | Local volumes must use a format that supports NTFS attributes. | Microsoft Windows Server 2016 |
| WN16-00-000200 | V2R9 | Non-administrative accounts or groups must only have print permissions on printer shares. | Microsoft Windows Server 2016 |
| WN16-DC-000340 | V2R9 | The Access this computer from the network user right must only be assigned to the Administrators, Authenticated Users, and Enterprise Domain Controllers groups on domain controllers. | Microsoft Windows Server 2016 |
| WN16-DC-000360 | V2R9 | The Allow log on through Remote Desktop Services user right must only be assigned to the Administrators group. | Microsoft Windows Server 2016 |
| WN16-DC-000370 | V2R9 | The Deny access to this computer from the network user right on domain controllers must be configured to prevent unauthenticated access. | Microsoft Windows Server 2016 |
| WN16-DC-000380 | V2R9 | The Deny log on as a batch job user right on domain controllers must be configured to prevent unauthenticated access. | Microsoft Windows Server 2016 |
| WN16-DC-000390 | V2R9 | The Deny log on as a service user right must be configured to include no accounts or groups (blank) on domain controllers. | Microsoft Windows Server 2016 |
| WN16-DC-000400 | V2R9 | The Deny log on locally user right on domain controllers must be configured to prevent unauthenticated access. | Microsoft Windows Server 2016 |
| WN16-MS-000340 | V2R9 | The "Access this computer from the network" user right must only be assigned to the Administrators and Authenticated Users groups on member servers. | Microsoft Windows Server 2016 |
| WN16-MS-000370 | V2R9 | The "Deny access to this computer from the network" user right on member servers must be configured to prevent access from highly privileged domain accounts and local accounts on domain systems and from unauthenticated access on all systems. | Microsoft Windows Server 2016 |
| WN16-MS-000380 | V2R9 | The "Deny log on as a batch job" user right on member servers must be configured to prevent access from highly privileged domain accounts on domain systems and from unauthenticated access on all systems. | Microsoft Windows Server 2016 |
| WN16-MS-000390 | V2R9 | The "Deny log on as a service" user right on member servers must be configured to prevent access from highly privileged domain accounts on domain systems. No other groups or accounts must be assigned this right. | Microsoft Windows Server 2016 |
| WN16-MS-000400 | V2R9 | The "Deny log on locally" user right on member servers must be configured to prevent access from highly privileged domain accounts on domain systems and from unauthenticated access on all systems. | Microsoft Windows Server 2016 |
| WN16-UR-000050 | V2R9 | The Allow log on locally user right must only be assigned to the Administrators group. | Microsoft Windows Server 2016 |
| WN19-00-000130 | V3R7 | Windows Server 2019 local volumes must use a format that supports NTFS attributes. | Microsoft Windows Server 2019 |
| WN19-00-000180 | V3R7 | Windows Server 2019 non-administrative accounts or groups must only have print permissions on printer shares. | Microsoft Windows Server 2019 |
| WN19-DC-000340 | V3R7 | Windows Server 2019 Access this computer from the network user right must only be assigned to the Administrators, Authenticated Users, and Enterprise Domain Controllers groups on domain controllers. | Microsoft Windows Server 2019 |
| WN19-DC-000360 | V3R7 | Windows Server 2019 Allow log on through Remote Desktop Services user right must only be assigned to the Administrators group on domain controllers. | Microsoft Windows Server 2019 |
| WN19-DC-000370 | V3R7 | Windows Server 2019 Deny access to this computer from the network user right on domain controllers must be configured to prevent unauthenticated access. | Microsoft Windows Server 2019 |
| WN19-DC-000380 | V3R7 | Windows Server 2019 Deny log on as a batch job user right on domain controllers must be configured to prevent unauthenticated access. | Microsoft Windows Server 2019 |
| WN19-DC-000390 | V3R7 | Windows Server 2019 Deny log on as a service user right must be configured to include no accounts or groups (blank) on domain controllers. | Microsoft Windows Server 2019 |
| WN19-DC-000400 | V3R7 | Windows Server 2019 Deny log on locally user right on domain controllers must be configured to prevent unauthenticated access. | Microsoft Windows Server 2019 |
| WN19-MS-000070 | V3R7 | Windows Server 2019 "Access this computer from the network" user right must only be assigned to the Administrators and Authenticated Users groups on domain-joined member servers and standalone or nondomain-joined systems. | Microsoft Windows Server 2019 |
| WN19-MS-000080 | V3R7 | Windows Server 2019 "Deny access to this computer from the network" user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts and local accounts and from unauthenticated access on all systems. | Microsoft Windows Server 2019 |
| WN19-MS-000090 | V3R7 | Windows Server 2019 "Deny log on as a batch job" user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts and from unauthenticated access on all systems. | Microsoft Windows Server 2019 |
| WN19-MS-000100 | V3R7 | Windows Server 2019 "Deny log on as a service" user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts. No other groups or accounts must be assigned this right. | Microsoft Windows Server 2019 |
| WN19-MS-000110 | V3R7 | Windows Server 2019 "Deny log on locally" user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts and from unauthenticated access on all systems. | Microsoft Windows Server 2019 |
| WN19-UR-000030 | V3R7 | Windows Server 2019 Allow log on locally user right must only be assigned to the Administrators group. | Microsoft Windows Server 2019 |
| WN19-DC-000391 | V3R7 | Windows Server 2019 must be configured for certificate-based authentication for domain controllers. | Microsoft Windows Server 2019 |
| WN19-DC-000401 | V3R7 | Windows Server 2019 must be configured for named-based strong mappings for certificates. | Microsoft Windows Server 2019 |
| WN22-00-000130 | V2R7 | Windows Server 2022 local volumes must use a format that supports NTFS attributes. | Microsoft Windows Server 2022 |
| WN22-00-000180 | V2R7 | Windows Server 2022 nonadministrative accounts or groups must only have print permissions on printer shares. | Microsoft Windows Server 2022 |
| WN22-DC-000340 | V2R7 | Windows Server 2022 Access this computer from the network user right must only be assigned to the Administrators, Authenticated Users, and Enterprise Domain Controllers groups on domain controllers. | Microsoft Windows Server 2022 |
| WN22-DC-000360 | V2R7 | Windows Server 2022 Allow log on through Remote Desktop Services user right must only be assigned to the Administrators group on domain controllers. | Microsoft Windows Server 2022 |
| WN22-DC-000370 | V2R7 | Windows Server 2022 Deny access to this computer from the network user right on domain controllers must be configured to prevent unauthenticated access. | Microsoft Windows Server 2022 |
| WN22-DC-000380 | V2R7 | Windows Server 2022 Deny log on as a batch job user right on domain controllers must be configured to prevent unauthenticated access. | Microsoft Windows Server 2022 |
| WN22-DC-000390 | V2R7 | Windows Server 2022 Deny log on as a service user right must be configured to include no accounts or groups (blank) on domain controllers. | Microsoft Windows Server 2022 |
| WN22-DC-000400 | V2R7 | Windows Server 2022 Deny log on locally user right on domain controllers must be configured to prevent unauthenticated access. | Microsoft Windows Server 2022 |
| WN22-MS-000070 | V2R7 | Windows Server 2022 Access this computer from the network user right must only be assigned to the Administrators and Authenticated Users groups on domain-joined member servers and standalone or nondomain-joined systems. | Microsoft Windows Server 2022 |
| WN22-MS-000080 | V2R7 | Windows Server 2022 Deny access to this computer from the network user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts and local accounts and from unauthenticated access on all systems. | Microsoft Windows Server 2022 |
| WN22-MS-000090 | V2R7 | Windows Server 2022 Deny log on as a batch job user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts and from unauthenticated access on all systems. | Microsoft Windows Server 2022 |
| WN22-MS-000100 | V2R7 | Windows Server 2022 Deny log on as a service user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts. No other groups or accounts must be assigned this right. | Microsoft Windows Server 2022 |
| WN22-MS-000110 | V2R7 | Windows Server 2022 Deny log on locally user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts and from unauthenticated access on all systems. | Microsoft Windows Server 2022 |
| WN22-UR-000030 | V2R7 | Windows Server 2022 Allow log on locally user right must only be assigned to the Administrators group. | Microsoft Windows Server 2022 |
| WN22-DC-000405 | V2R7 | Windows Server 2022 must be configured for certificate-based authentication for domain controllers. | Microsoft Windows Server 2022 |
| WN22-DC-000406 | V2R7 | Windows Server 2022 must be configured for name-based strong mappings for certificates. | Microsoft Windows Server 2022 |