SRG-OS-000080-GPOS-00048 Controls

STIG IDVersionTitleProduct
ALMA-09-006180V1R2AlmaLinux OS 9 must require authentication to access emergency mode.
ALMA-09-006290V1R2AlmaLinux OS 9 must require a boot loader password.
ALMA-09-006400V1R2AlmaLinux OS 9 must require a unique superuser's name upon booting into single-user and maintenance modes.
ALMA-09-006510V1R2AlmaLinux OS 9 must require authentication to access single-user mode.
APPL-14-000033V2R3The macOS system must disable FileVault automatic log on.
APPL-14-002001V2R3The macOS system must disable Server Message Block sharing.
APPL-14-002003V2R3The macOS system must disable Network File System service.
APPL-14-002006V2R3The macOS system must disable Unix-to-Unix Copy Protocol service.
APPL-14-002008V2R3The macOS system must disable the built-in web server.
APPL-14-002009V2R3The macOS system must disable AirDrop.
APPL-14-002022V2R3The macOS system must disable Remote Apple Events.
APPL-14-002050V2R3The macOS system must disable Screen Sharing and Apple Remote Desktop.
APPL-14-002100V2R3The macOS system must disable Media Sharing.
APPL-14-002110V2R3The macOS system must disable Bluetooth sharing.
APPL-14-005058V2R3The macOS system must disable Handoff.
APPL-14-005070V2R3The macOS system must enable Authenticated Root.
APPL-15-000033V1R3The macOS system must disable FileVault automatic login.
APPL-15-002001V1R3The macOS system must disable Server Message Block (SMB) sharing.
APPL-15-002003V1R3The macOS system must disable Network File System (NFS) service.
APPL-15-002006V1R3The macOS system must disable Unix-to-Unix Copy Protocol (UUCP) service.
APPL-15-002008V1R3The macOS system must disable the built-in web server.
APPL-15-002009V1R3The macOS system must disable AirDrop.
APPL-15-002022V1R3The macOS system must disable Remote Apple Events.
APPL-15-002050V1R3The macOS system must disable Screen Sharing and Apple Remote Desktop.
APPL-15-002100V1R3The macOS system must disable Media Sharing.
APPL-15-002110V1R3The macOS system must disable Bluetooth Sharing.
APPL-15-005058V1R3The macOS system must disable Handoff.
APPL-15-005070V1R3The macOS system must enable Authenticated Root.
APPL-15-002271V1R3The macOS system must disable iPhone Mirroring.
OL07-00-010481V3R2The Oracle Linux operating system must require authentication upon booting into single-user and maintenance modes.
OL07-00-010482V3R2Oracle Linux operating systems version 7.2 or newer with a Basic Input/Output System (BIOS) must require authentication upon booting into single-user and maintenance modes.
OL07-00-010491V3R2Oracle Linux operating systems version 7.2 or newer using Unified Extensible Firmware Interface (UEFI) must require authentication upon booting into single-user and maintenance modes.
OL07-00-010483V3R2Oracle Linux operating systems version 7.2 or newer booted with a BIOS must have a unique name for the grub superusers account when booting into single-user and maintenance modes.
OL07-00-010492V3R2Oracle Linux operating systems version 7.2 or newer booted with United Extensible Firmware Interface (UEFI) must have a unique name for the grub superusers account when booting into single-user mode and maintenance.
OL08-00-010140V2R4OL 8 operating systems booted with United Extensible Firmware Interface (UEFI) must require authentication upon booting into single-user mode and maintenance.
OL08-00-010141V2R4OL 8 operating systems booted with United Extensible Firmware Interface (UEFI) must have a unique name for the grub superusers account when booting into single-user mode and maintenance.
OL08-00-010149V2R4OL 8 operating systems booted with a BIOS must have a unique name for the grub superusers account when booting into single-user and maintenance modes.
OL08-00-010150V2R4OL 8 operating systems booted with a BIOS must require authentication upon booting into single-user and maintenance modes.
OL08-00-010151V2R4OL 8 operating systems must require authentication upon booting into rescue mode.
OL08-00-010152V2R4OL 8 operating systems must require authentication upon booting into emergency mode.
OL09-00-000025V1R1OL 9 must require authentication to access emergency mode.
OL09-00-000030V1R1OL 9 must require authentication to access single-user mode.
OL09-00-000050V1R1OL 9 must require a unique superuser's name upon booting into single-user and maintenance modes.
OL09-00-001115V1R1OL 9 must require a boot loader superuser password.
RHEL-07-010481V3R9The Red Hat Enterprise Linux operating system must require authentication upon booting into single-user and maintenance modes.
RHEL-07-010482V3R9Red Hat Enterprise Linux operating systems version 7.2 or newer with a Basic Input/Output System (BIOS) must require authentication upon booting into single-user and maintenance modes.
RHEL-07-010491V3R9Red Hat Enterprise Linux operating systems version 7.2 or newer using Unified Extensible Firmware Interface (UEFI) must require authentication upon booting into single-user and maintenance modes.
RHEL-07-010483V3R9Red Hat Enterprise Linux operating systems version 7.2 or newer booted with a BIOS must have a unique name for the grub superusers account when booting into single-user and maintenance modes.
RHEL-07-010492V3R9Red Hat Enterprise Linux operating systems version 7.2 or newer booted with United Extensible Firmware Interface (UEFI) must have a unique name for the grub superusers account when booting into single-user mode and maintenance.
RHEL-08-010140V2R3RHEL 8 operating systems booted with United Extensible Firmware Interface (UEFI) must require authentication upon booting into single-user mode and maintenance.
RHEL-08-010150V2R3RHEL 8 operating systems booted with a BIOS must require authentication upon booting into single-user and maintenance modes.
RHEL-08-010151V2R3RHEL 8 operating systems must require authentication upon booting into rescue mode.
RHEL-08-010141V2R3RHEL 8 operating systems booted with United Extensible Firmware Interface (UEFI) must require a unique superusers name upon booting into single-user mode and maintenance.
RHEL-08-010149V2R3RHEL 8 operating systems booted with a BIOS must require a unique superusers name upon booting into single-user and maintenance modes.
RHEL-08-010152V2R3RHEL 8 operating systems must require authentication upon booting into emergency mode.
RHEL-09-212010V2R4RHEL 9 must require a boot loader superuser password.
RHEL-09-212020V2R4RHEL 9 must require a unique superusers name upon booting into single-user and maintenance modes.
RHEL-09-611195V2R4RHEL 9 must require authentication to access emergency mode.
RHEL-09-611200V2R4RHEL 9 must require authentication to access single-user mode.
RHEL-09-232103V2R4RHEL 9 "/etc/audit/" must be owned by root.
RHEL-09-232104V2R4RHEL 9 "/etc/audit/" must be group-owned by root.
SLES-12-010430V3R2SUSE operating systems with a basic input/output system (BIOS) must require authentication upon booting into single-user and maintenance modes.
SLES-12-010440V3R2SUSE operating systems with Unified Extensible Firmware Interface (UEFI) implemented must require authentication upon booting into single-user mode and maintenance.
SLES-15-010190V2R4SUSE operating systems with a basic input/output system (BIOS) must require authentication upon booting into single-user and maintenance modes.
SLES-15-010200V2R4SUSE operating systems with Unified Extensible Firmware Interface (UEFI) implemented must require authentication upon booting into single-user mode and maintenance.
UBTU-18-010000V2R15Ubuntu operating systems booted with a BIOS must require authentication upon booting into single-user and maintenance modes.
UBTU-18-010001V2R15Ubuntu operating systems booted with United Extensible Firmware Interface (UEFI) implemented must require authentication upon booting into single-user mode and maintenance.
UBTU-20-010009V2R1Ubuntu operating systems when booted must require authentication upon booting into single-user and maintenance modes.
UBTU-22-212010V2R4Ubuntu 22.04 LTS, when booted, must require authentication upon booting into single-user and maintenance modes.
UBTU-24-102000V1R1Ubuntu 24.04 LTS when booted must require authentication upon booting into single-user and maintenance modes.
WN10-00-000050V3R4Local volumes must be formatted using NTFS.
WN10-UR-000010V3R4The Access this computer from the network user right must only be assigned to the Administrators and Remote Desktop Users groups.
WN10-UR-000025V3R4The Allow log on locally user right must only be assigned to the Administrators and Users groups.
WN10-UR-000070V3R4The Deny access to this computer from the network user right on workstations must be configured to prevent access from highly privileged domain accounts and local accounts on domain systems and unauthenticated access on all systems.
WN10-UR-000075V3R4The "Deny log on as a batch job" user right on domain-joined workstations must be configured to prevent access from highly privileged domain accounts.
WN10-UR-000080V3R4The Deny log on as a service user right on Windows 10 domain-joined workstations must be configured to prevent access from highly privileged domain accounts.
WN10-UR-000085V3R4The Deny log on locally user right on workstations must be configured to prevent access from highly privileged domain accounts on domain systems and unauthenticated access on all systems.
WN10-UR-000090V3R4The Deny log on through Remote Desktop Services user right on Windows 10 workstations must at a minimum be configured to prevent access from highly privileged domain accounts and local accounts on domain systems and unauthenticated access on all systems.
WN11-00-000050V2R3Local volumes must be formatted using NTFS.
WN11-UR-000010V2R3The "Access this computer from the network" user right must only be assigned to the Administrators and Remote Desktop Users groups.
WN11-UR-000025V2R3The "Allow log on locally" user right must only be assigned to the Administrators and Users groups.
WN11-UR-000070V2R3The "Deny access to this computer from the network" user right on workstations must be configured to prevent access from highly privileged domain accounts and local accounts on domain systems and unauthenticated access on all systems.
WN11-UR-000075V2R3The "Deny log on as a batch job" user right on domain-joined workstations must be configured to prevent access from highly privileged domain accounts.
WN11-UR-000080V2R3The "Deny log on as a service" user right on Windows 11 domain-joined workstations must be configured to prevent access from highly privileged domain accounts.
WN11-UR-000085V2R3The "Deny log on locally" user right on workstations must be configured to prevent access from highly privileged domain accounts on domain systems and unauthenticated access on all systems.
WN11-UR-000090V2R3The "Deny log on through Remote Desktop Services" user right on Windows 11 workstations must be configured to prevent access from highly privileged domain accounts and local accounts on domain systems and unauthenticated access on all systems.
WN16-00-000150V2R9Local volumes must use a format that supports NTFS attributes.
WN16-00-000200V2R9Non-administrative accounts or groups must only have print permissions on printer shares.
WN16-DC-000340V2R9The Access this computer from the network user right must only be assigned to the Administrators, Authenticated Users, and Enterprise Domain Controllers groups on domain controllers.
WN16-DC-000360V2R9The Allow log on through Remote Desktop Services user right must only be assigned to the Administrators group.
WN16-DC-000370V2R9The Deny access to this computer from the network user right on domain controllers must be configured to prevent unauthenticated access.
WN16-DC-000380V2R9The Deny log on as a batch job user right on domain controllers must be configured to prevent unauthenticated access.
WN16-DC-000390V2R9The Deny log on as a service user right must be configured to include no accounts or groups (blank) on domain controllers.
WN16-DC-000400V2R9The Deny log on locally user right on domain controllers must be configured to prevent unauthenticated access.
WN16-MS-000340V2R9The "Access this computer from the network" user right must only be assigned to the Administrators and Authenticated Users groups on member servers.
WN16-MS-000370V2R9The "Deny access to this computer from the network" user right on member servers must be configured to prevent access from highly privileged domain accounts and local accounts on domain systems and from unauthenticated access on all systems.
WN16-MS-000380V2R9The "Deny log on as a batch job" user right on member servers must be configured to prevent access from highly privileged domain accounts on domain systems and from unauthenticated access on all systems.
WN16-MS-000390V2R9The "Deny log on as a service" user right on member servers must be configured to prevent access from highly privileged domain accounts on domain systems. No other groups or accounts must be assigned this right.
WN16-MS-000400V2R9The "Deny log on locally" user right on member servers must be configured to prevent access from highly privileged domain accounts on domain systems and from unauthenticated access on all systems.
WN16-UR-000050V2R9The Allow log on locally user right must only be assigned to the Administrators group.
WN19-00-000130V3R4Windows Server 2019 local volumes must use a format that supports NTFS attributes.
WN19-00-000180V3R4Windows Server 2019 non-administrative accounts or groups must only have print permissions on printer shares.
WN19-DC-000340V3R4Windows Server 2019 Access this computer from the network user right must only be assigned to the Administrators, Authenticated Users, and Enterprise Domain Controllers groups on domain controllers.
WN19-DC-000360V3R4Windows Server 2019 Allow log on through Remote Desktop Services user right must only be assigned to the Administrators group on domain controllers.
WN19-DC-000370V3R4Windows Server 2019 Deny access to this computer from the network user right on domain controllers must be configured to prevent unauthenticated access.
WN19-DC-000380V3R4Windows Server 2019 Deny log on as a batch job user right on domain controllers must be configured to prevent unauthenticated access.
WN19-DC-000390V3R4Windows Server 2019 Deny log on as a service user right must be configured to include no accounts or groups (blank) on domain controllers.
WN19-DC-000400V3R4Windows Server 2019 Deny log on locally user right on domain controllers must be configured to prevent unauthenticated access.
WN19-MS-000070V3R4Windows Server 2019 "Access this computer from the network" user right must only be assigned to the Administrators and Authenticated Users groups on domain-joined member servers and standalone or nondomain-joined systems.
WN19-MS-000080V3R4Windows Server 2019 "Deny access to this computer from the network" user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts and local accounts and from unauthenticated access on all systems.
WN19-MS-000090V3R4Windows Server 2019 "Deny log on as a batch job" user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts and from unauthenticated access on all systems.
WN19-MS-000100V3R4Windows Server 2019 "Deny log on as a service" user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts. No other groups or accounts must be assigned this right.
WN19-MS-000110V3R4Windows Server 2019 "Deny log on locally" user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts and from unauthenticated access on all systems.
WN19-UR-000030V3R4Windows Server 2019 Allow log on locally user right must only be assigned to the Administrators group.
WN19-DC-000391V3R4Windows Server 2019 must be configured for certificate-based authentication for domain controllers.
WN19-DC-000401V3R4Windows Server 2019 must be configured for named-based strong mappings for certificates.
WN22-00-000130V2R4Windows Server 2022 local volumes must use a format that supports NTFS attributes.
WN22-00-000180V2R4Windows Server 2022 nonadministrative accounts or groups must only have print permissions on printer shares.
WN22-DC-000340V2R4Windows Server 2022 Access this computer from the network user right must only be assigned to the Administrators, Authenticated Users, and Enterprise Domain Controllers groups on domain controllers.
WN22-DC-000360V2R4Windows Server 2022 Allow log on through Remote Desktop Services user right must only be assigned to the Administrators group on domain controllers.
WN22-DC-000370V2R4Windows Server 2022 Deny access to this computer from the network user right on domain controllers must be configured to prevent unauthenticated access.
WN22-DC-000380V2R4Windows Server 2022 Deny log on as a batch job user right on domain controllers must be configured to prevent unauthenticated access.
WN22-DC-000390V2R4Windows Server 2022 Deny log on as a service user right must be configured to include no accounts or groups (blank) on domain controllers.
WN22-DC-000400V2R4Windows Server 2022 Deny log on locally user right on domain controllers must be configured to prevent unauthenticated access.
WN22-MS-000070V2R4Windows Server 2022 Access this computer from the network user right must only be assigned to the Administrators and Authenticated Users groups on domain-joined member servers and standalone or nondomain-joined systems.
WN22-MS-000080V2R4Windows Server 2022 Deny access to this computer from the network user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts and local accounts and from unauthenticated access on all systems.
WN22-MS-000090V2R4Windows Server 2022 Deny log on as a batch job user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts and from unauthenticated access on all systems.
WN22-MS-000100V2R4Windows Server 2022 Deny log on as a service user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts. No other groups or accounts must be assigned this right.
WN22-MS-000110V2R4Windows Server 2022 Deny log on locally user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts and from unauthenticated access on all systems.
WN22-UR-000030V2R4Windows Server 2022 Allow log on locally user right must only be assigned to the Administrators group.
WN22-DC-000405V2R4Windows Server 2022 must be configured for certificate-based authentication for domain controllers.
WN22-DC-000406V2R4Windows Server 2022 must be configured for name-based strong mappings for certificates.