SRG-OS-000080-GPOS-00048 Controls

STIG IDVersionTitleProduct
ALMA-09-006180V1R5AlmaLinux OS 9 must require authentication to access emergency mode.AlmaLinux OS 9
ALMA-09-006290V1R5AlmaLinux OS 9 must require a boot loader password.AlmaLinux OS 9
ALMA-09-006400V1R5AlmaLinux OS 9 must require a unique superuser's name upon booting into single-user and maintenance modes.AlmaLinux OS 9
ALMA-09-006510V1R5AlmaLinux OS 9 must require authentication to access single-user mode.AlmaLinux OS 9
APPL-14-000033V2R4The macOS system must disable FileVault automatic log on.macOS 14 - Sonoma
APPL-14-002001V2R4The macOS system must disable Server Message Block sharing.macOS 14 - Sonoma
APPL-14-002003V2R4The macOS system must disable Network File System service.macOS 14 - Sonoma
APPL-14-002006V2R4The macOS system must disable Unix-to-Unix Copy Protocol service.macOS 14 - Sonoma
APPL-14-002008V2R4The macOS system must disable the built-in web server.macOS 14 - Sonoma
APPL-14-002009V2R4The macOS system must disable AirDrop.macOS 14 - Sonoma
APPL-14-002022V2R4The macOS system must disable Remote Apple Events.macOS 14 - Sonoma
APPL-14-002050V2R4The macOS system must disable Screen Sharing and Apple Remote Desktop.macOS 14 - Sonoma
APPL-14-002100V2R4The macOS system must disable Media Sharing.macOS 14 - Sonoma
APPL-14-002110V2R4The macOS system must disable Bluetooth sharing.macOS 14 - Sonoma
APPL-14-005058V2R4The macOS system must disable Handoff.macOS 14 - Sonoma
APPL-14-005070V2R4The macOS system must enable Authenticated Root.macOS 14 - Sonoma
APPL-15-000033V1R6The macOS system must disable FileVault automatic login.macOS 15 - Sequoia
APPL-15-002001V1R6The macOS system must disable Server Message Block (SMB) sharing.macOS 15 - Sequoia
APPL-15-002003V1R6The macOS system must disable Network File System (NFS) service.macOS 15 - Sequoia
APPL-15-002006V1R6The macOS system must disable Unix-to-Unix Copy Protocol (UUCP) service.macOS 15 - Sequoia
APPL-15-002008V1R6The macOS system must disable the built-in web server.macOS 15 - Sequoia
APPL-15-002009V1R6The macOS system must disable AirDrop.macOS 15 - Sequoia
APPL-15-002022V1R6The macOS system must disable Remote Apple Events.macOS 15 - Sequoia
APPL-15-002050V1R6The macOS system must disable Screen Sharing and Apple Remote Desktop.macOS 15 - Sequoia
APPL-15-002100V1R6The macOS system must disable Media Sharing.macOS 15 - Sequoia
APPL-15-002110V1R6The macOS system must disable Bluetooth Sharing.macOS 15 - Sequoia
APPL-15-005058V1R6The macOS system must disable Handoff.macOS 15 - Sequoia
APPL-15-005070V1R6The macOS system must enable Authenticated Root.macOS 15 - Sequoia
APPL-15-002271V1R6The macOS system must disable iPhone Mirroring.macOS 15 - Sequoia
OL07-00-010481V3R5The Oracle Linux operating system must require authentication upon booting into single-user and maintenance modes.Oracle Linux 7
OL07-00-010482V3R5Oracle Linux operating systems version 7.2 or newer with a Basic Input/Output System (BIOS) must require authentication upon booting into single-user and maintenance modes.Oracle Linux 7
OL07-00-010491V3R5Oracle Linux operating systems version 7.2 or newer using Unified Extensible Firmware Interface (UEFI) must require authentication upon booting into single-user and maintenance modes.Oracle Linux 7
OL07-00-010483V3R5Oracle Linux operating systems version 7.2 or newer booted with a BIOS must have a unique name for the grub superusers account when booting into single-user and maintenance modes.Oracle Linux 7
OL07-00-010492V3R5Oracle Linux operating systems version 7.2 or newer booted with United Extensible Firmware Interface (UEFI) must have a unique name for the grub superusers account when booting into single-user mode and maintenance.Oracle Linux 7
OL08-00-010140V2R7OL 8 operating systems booted with United Extensible Firmware Interface (UEFI) must require authentication upon booting into single-user mode and maintenance.Oracle Linux 8
OL08-00-010141V2R7OL 8 operating systems booted with United Extensible Firmware Interface (UEFI) must have a unique name for the grub superusers account when booting into single-user mode and maintenance.Oracle Linux 8
OL08-00-010149V2R7OL 8 operating systems booted with a BIOS must have a unique name for the grub superusers account when booting into single-user and maintenance modes.Oracle Linux 8
OL08-00-010150V2R7OL 8 operating systems booted with a BIOS must require authentication upon booting into single-user and maintenance modes.Oracle Linux 8
OL08-00-010151V2R7OL 8 operating systems must require authentication upon booting into rescue mode.Oracle Linux 8
OL08-00-010152V2R7OL 8 operating systems must require authentication upon booting into emergency mode.Oracle Linux 8
OL09-00-000025V1R4OL 9 must require authentication to access emergency mode.Oracle Linux 9
OL09-00-000030V1R4OL 9 must require authentication to access single-user mode.Oracle Linux 9
OL09-00-000050V1R4OL 9 must require a unique superuser's name upon booting into single-user and maintenance modes.Oracle Linux 9
OL09-00-001115V1R4OL 9 must require a boot loader superuser password.Oracle Linux 9
RHEL-07-010481V3R9The Red Hat Enterprise Linux operating system must require authentication upon booting into single-user and maintenance modes.Red Hat Enterprise Linux 7
RHEL-07-010482V3R9Red Hat Enterprise Linux operating systems version 7.2 or newer with a Basic Input/Output System (BIOS) must require authentication upon booting into single-user and maintenance modes.Red Hat Enterprise Linux 7
RHEL-07-010491V3R9Red Hat Enterprise Linux operating systems version 7.2 or newer using Unified Extensible Firmware Interface (UEFI) must require authentication upon booting into single-user and maintenance modes.Red Hat Enterprise Linux 7
RHEL-07-010483V3R9Red Hat Enterprise Linux operating systems version 7.2 or newer booted with a BIOS must have a unique name for the grub superusers account when booting into single-user and maintenance modes.Red Hat Enterprise Linux 7
RHEL-07-010492V3R9Red Hat Enterprise Linux operating systems version 7.2 or newer booted with United Extensible Firmware Interface (UEFI) must have a unique name for the grub superusers account when booting into single-user mode and maintenance.Red Hat Enterprise Linux 7
RHEL-08-010140V2R6RHEL 8 operating systems booted with United Extensible Firmware Interface (UEFI) must require authentication upon booting into single-user mode and maintenance.Red Hat Enterprise Linux 8
RHEL-08-010150V2R6RHEL 8 operating systems booted with a BIOS must require authentication upon booting into single-user and maintenance modes.Red Hat Enterprise Linux 8
RHEL-08-010151V2R6RHEL 8 operating systems must require authentication upon booting into rescue mode.Red Hat Enterprise Linux 8
RHEL-08-010141V2R6RHEL 8 operating systems booted with United Extensible Firmware Interface (UEFI) must require a unique superusers name upon booting into single-user mode and maintenance.Red Hat Enterprise Linux 8
RHEL-08-010149V2R6RHEL 8 operating systems booted with a BIOS must require a unique superusers name upon booting into single-user and maintenance modes.Red Hat Enterprise Linux 8
RHEL-08-010152V2R6RHEL 8 operating systems must require authentication upon booting into emergency mode.Red Hat Enterprise Linux 8
RHEL-09-212010V2R7RHEL 9 must require a boot loader superuser password.Red Hat Enterprise Linux 9
RHEL-09-212020V2R7RHEL 9 must require a unique superusers name upon booting into single-user and maintenance modes.Red Hat Enterprise Linux 9
RHEL-09-611195V2R7RHEL 9 must require authentication to access emergency mode.Red Hat Enterprise Linux 9
RHEL-09-611200V2R7RHEL 9 must require authentication to access single-user mode.Red Hat Enterprise Linux 9
RHEL-09-232103V2R7RHEL 9 "/etc/audit/" must be owned by root.Red Hat Enterprise Linux 9
RHEL-09-232104V2R7RHEL 9 "/etc/audit/" must be group-owned by root.Red Hat Enterprise Linux 9
SLES-12-010430V3R4SUSE operating systems with a basic input/output system (BIOS) must require authentication upon booting into single-user and maintenance modes.SUSE Linux Enterprise 12
SLES-12-010440V3R4SUSE operating systems with Unified Extensible Firmware Interface (UEFI) implemented must require authentication upon booting into single-user mode and maintenance.SUSE Linux Enterprise 12
SLES-15-010190V2R4SUSE operating systems with a basic input/output system (BIOS) must require authentication upon booting into single-user and maintenance modes.SUSE Linux Enterprise 15
SLES-15-010200V2R4SUSE operating systems with Unified Extensible Firmware Interface (UEFI) implemented must require authentication upon booting into single-user mode and maintenance.SUSE Linux Enterprise 15
TOSS-04-010030V2R3TOSS must require authentication upon booting into emergency or rescue modes.Tri-Lab Operating System Stack
UBTU-18-010000V2R15Ubuntu operating systems booted with a BIOS must require authentication upon booting into single-user and maintenance modes.Ubuntu 18.04
UBTU-18-010001V2R15Ubuntu operating systems booted with United Extensible Firmware Interface (UEFI) implemented must require authentication upon booting into single-user mode and maintenance.Ubuntu 18.04
UBTU-20-010009V2R3Ubuntu operating systems when booted must require authentication upon booting into single-user and maintenance modes.Ubuntu 20.04
UBTU-22-212010V2R7Ubuntu 22.04 LTS, when booted, must require authentication upon booting into single-user and maintenance modes.Ubuntu 22.04
UBTU-24-102000V1R1Ubuntu 24.04 LTS when booted must require authentication upon booting into single-user and maintenance modes.Ubuntu 24.04
WN10-00-000050V3R6Local volumes must be formatted using NTFS.Microsoft Windows 10
WN10-UR-000010V3R6The Access this computer from the network user right must only be assigned to the Administrators and Remote Desktop Users groups.Microsoft Windows 10
WN10-UR-000025V3R6The Allow log on locally user right must only be assigned to the Administrators and Users groups.Microsoft Windows 10
WN10-UR-000070V3R6The Deny access to this computer from the network user right on workstations must be configured to prevent access from highly privileged domain accounts and local accounts on domain systems and unauthenticated access on all systems.Microsoft Windows 10
WN10-UR-000075V3R6The "Deny log on as a batch job" user right on domain-joined workstations must be configured to prevent access from highly privileged domain accounts.Microsoft Windows 10
WN10-UR-000080V3R6The Deny log on as a service user right on Windows 10 domain-joined workstations must be configured to prevent access from highly privileged domain accounts.Microsoft Windows 10
WN10-UR-000085V3R6The Deny log on locally user right on workstations must be configured to prevent access from highly privileged domain accounts on domain systems and unauthenticated access on all systems.Microsoft Windows 10
WN10-UR-000090V3R6The Deny log on through Remote Desktop Services user right on Windows 10 workstations must at a minimum be configured to prevent access from highly privileged domain accounts and local accounts on domain systems and unauthenticated access on all systems.Microsoft Windows 10
WN11-00-000050V2R5Local volumes must be formatted using NTFS.Microsoft Windows 11
WN11-UR-000010V2R5The "Access this computer from the network" user right must only be assigned to the Administrators and Remote Desktop Users groups.Microsoft Windows 11
WN11-UR-000025V2R5The "Allow log on locally" user right must only be assigned to the Administrators and Users groups.Microsoft Windows 11
WN11-UR-000070V2R5The "Deny access to this computer from the network" user right on workstations must be configured to prevent access from highly privileged domain accounts and local accounts on domain systems and unauthenticated access on all systems.Microsoft Windows 11
WN11-UR-000075V2R5The "Deny log on as a batch job" user right on domain-joined workstations must be configured to prevent access from highly privileged domain accounts.Microsoft Windows 11
WN11-UR-000080V2R5The "Deny log on as a service" user right on Windows 11 domain-joined workstations must be configured to prevent access from highly privileged domain accounts.Microsoft Windows 11
WN11-UR-000085V2R5The "Deny log on locally" user right on workstations must be configured to prevent access from highly privileged domain accounts on domain systems and unauthenticated access on all systems.Microsoft Windows 11
WN11-UR-000090V2R5The "Deny log on through Remote Desktop Services" user right on Windows 11 workstations must be configured to prevent access from highly privileged domain accounts and local accounts on domain systems and unauthenticated access on all systems.Microsoft Windows 11
WN16-00-000150V2R9Local volumes must use a format that supports NTFS attributes.Microsoft Windows Server 2016
WN16-00-000200V2R9Non-administrative accounts or groups must only have print permissions on printer shares.Microsoft Windows Server 2016
WN16-DC-000340V2R9The Access this computer from the network user right must only be assigned to the Administrators, Authenticated Users, and Enterprise Domain Controllers groups on domain controllers.Microsoft Windows Server 2016
WN16-DC-000360V2R9The Allow log on through Remote Desktop Services user right must only be assigned to the Administrators group.Microsoft Windows Server 2016
WN16-DC-000370V2R9The Deny access to this computer from the network user right on domain controllers must be configured to prevent unauthenticated access.Microsoft Windows Server 2016
WN16-DC-000380V2R9The Deny log on as a batch job user right on domain controllers must be configured to prevent unauthenticated access.Microsoft Windows Server 2016
WN16-DC-000390V2R9The Deny log on as a service user right must be configured to include no accounts or groups (blank) on domain controllers.Microsoft Windows Server 2016
WN16-DC-000400V2R9The Deny log on locally user right on domain controllers must be configured to prevent unauthenticated access.Microsoft Windows Server 2016
WN16-MS-000340V2R9The "Access this computer from the network" user right must only be assigned to the Administrators and Authenticated Users groups on member servers.Microsoft Windows Server 2016
WN16-MS-000370V2R9The "Deny access to this computer from the network" user right on member servers must be configured to prevent access from highly privileged domain accounts and local accounts on domain systems and from unauthenticated access on all systems.Microsoft Windows Server 2016
WN16-MS-000380V2R9The "Deny log on as a batch job" user right on member servers must be configured to prevent access from highly privileged domain accounts on domain systems and from unauthenticated access on all systems.Microsoft Windows Server 2016
WN16-MS-000390V2R9The "Deny log on as a service" user right on member servers must be configured to prevent access from highly privileged domain accounts on domain systems. No other groups or accounts must be assigned this right.Microsoft Windows Server 2016
WN16-MS-000400V2R9The "Deny log on locally" user right on member servers must be configured to prevent access from highly privileged domain accounts on domain systems and from unauthenticated access on all systems.Microsoft Windows Server 2016
WN16-UR-000050V2R9The Allow log on locally user right must only be assigned to the Administrators group.Microsoft Windows Server 2016
WN19-00-000130V3R7Windows Server 2019 local volumes must use a format that supports NTFS attributes.Microsoft Windows Server 2019
WN19-00-000180V3R7Windows Server 2019 non-administrative accounts or groups must only have print permissions on printer shares.Microsoft Windows Server 2019
WN19-DC-000340V3R7Windows Server 2019 Access this computer from the network user right must only be assigned to the Administrators, Authenticated Users, and Enterprise Domain Controllers groups on domain controllers.Microsoft Windows Server 2019
WN19-DC-000360V3R7Windows Server 2019 Allow log on through Remote Desktop Services user right must only be assigned to the Administrators group on domain controllers.Microsoft Windows Server 2019
WN19-DC-000370V3R7Windows Server 2019 Deny access to this computer from the network user right on domain controllers must be configured to prevent unauthenticated access.Microsoft Windows Server 2019
WN19-DC-000380V3R7Windows Server 2019 Deny log on as a batch job user right on domain controllers must be configured to prevent unauthenticated access.Microsoft Windows Server 2019
WN19-DC-000390V3R7Windows Server 2019 Deny log on as a service user right must be configured to include no accounts or groups (blank) on domain controllers.Microsoft Windows Server 2019
WN19-DC-000400V3R7Windows Server 2019 Deny log on locally user right on domain controllers must be configured to prevent unauthenticated access.Microsoft Windows Server 2019
WN19-MS-000070V3R7Windows Server 2019 "Access this computer from the network" user right must only be assigned to the Administrators and Authenticated Users groups on domain-joined member servers and standalone or nondomain-joined systems.Microsoft Windows Server 2019
WN19-MS-000080V3R7Windows Server 2019 "Deny access to this computer from the network" user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts and local accounts and from unauthenticated access on all systems.Microsoft Windows Server 2019
WN19-MS-000090V3R7Windows Server 2019 "Deny log on as a batch job" user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts and from unauthenticated access on all systems.Microsoft Windows Server 2019
WN19-MS-000100V3R7Windows Server 2019 "Deny log on as a service" user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts. No other groups or accounts must be assigned this right.Microsoft Windows Server 2019
WN19-MS-000110V3R7Windows Server 2019 "Deny log on locally" user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts and from unauthenticated access on all systems.Microsoft Windows Server 2019
WN19-UR-000030V3R7Windows Server 2019 Allow log on locally user right must only be assigned to the Administrators group.Microsoft Windows Server 2019
WN19-DC-000391V3R7Windows Server 2019 must be configured for certificate-based authentication for domain controllers.Microsoft Windows Server 2019
WN19-DC-000401V3R7Windows Server 2019 must be configured for named-based strong mappings for certificates.Microsoft Windows Server 2019
WN22-00-000130V2R7Windows Server 2022 local volumes must use a format that supports NTFS attributes.Microsoft Windows Server 2022
WN22-00-000180V2R7Windows Server 2022 nonadministrative accounts or groups must only have print permissions on printer shares.Microsoft Windows Server 2022
WN22-DC-000340V2R7Windows Server 2022 Access this computer from the network user right must only be assigned to the Administrators, Authenticated Users, and Enterprise Domain Controllers groups on domain controllers.Microsoft Windows Server 2022
WN22-DC-000360V2R7Windows Server 2022 Allow log on through Remote Desktop Services user right must only be assigned to the Administrators group on domain controllers.Microsoft Windows Server 2022
WN22-DC-000370V2R7Windows Server 2022 Deny access to this computer from the network user right on domain controllers must be configured to prevent unauthenticated access.Microsoft Windows Server 2022
WN22-DC-000380V2R7Windows Server 2022 Deny log on as a batch job user right on domain controllers must be configured to prevent unauthenticated access.Microsoft Windows Server 2022
WN22-DC-000390V2R7Windows Server 2022 Deny log on as a service user right must be configured to include no accounts or groups (blank) on domain controllers.Microsoft Windows Server 2022
WN22-DC-000400V2R7Windows Server 2022 Deny log on locally user right on domain controllers must be configured to prevent unauthenticated access.Microsoft Windows Server 2022
WN22-MS-000070V2R7Windows Server 2022 Access this computer from the network user right must only be assigned to the Administrators and Authenticated Users groups on domain-joined member servers and standalone or nondomain-joined systems.Microsoft Windows Server 2022
WN22-MS-000080V2R7Windows Server 2022 Deny access to this computer from the network user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts and local accounts and from unauthenticated access on all systems.Microsoft Windows Server 2022
WN22-MS-000090V2R7Windows Server 2022 Deny log on as a batch job user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts and from unauthenticated access on all systems.Microsoft Windows Server 2022
WN22-MS-000100V2R7Windows Server 2022 Deny log on as a service user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts. No other groups or accounts must be assigned this right.Microsoft Windows Server 2022
WN22-MS-000110V2R7Windows Server 2022 Deny log on locally user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts and from unauthenticated access on all systems.Microsoft Windows Server 2022
WN22-UR-000030V2R7Windows Server 2022 Allow log on locally user right must only be assigned to the Administrators group.Microsoft Windows Server 2022
WN22-DC-000405V2R7Windows Server 2022 must be configured for certificate-based authentication for domain controllers.Microsoft Windows Server 2022
WN22-DC-000406V2R7Windows Server 2022 must be configured for name-based strong mappings for certificates.Microsoft Windows Server 2022