SRG-OS-000138-GPOS-00069 Controls

STIG IDVersionTitleProduct
ALMA-09-042150V1R2Any AlmaLinux OS 9 world-writable directories must be owned by root, sys, bin, or an application user.
ALMA-09-042260V1R2A sticky bit must be set on all AlmaLinux OS 9 public directories.
OL07-00-010375V3R2The Oracle Linux operating system must restrict access to the kernel message buffer.
OL08-00-010190V2R4A sticky bit must be set on all OL 8 public directories to prevent unauthorized and unintended information transferred via shared system resources.
OL08-00-010375V2R4OL 8 must restrict access to the kernel message buffer.
OL08-00-010376V2R4OL 8 must prevent kernel profiling by unprivileged users.
OL09-00-002510V1R1OL 9 must be configured so that a sticky bit must be set on all public directories.
OL09-00-002516V1R1OL 9 world-writable directories must be owned by root, sys, bin, or an application user.
RHEL-07-010375V3R14The Red Hat Enterprise Linux operating system must restrict access to the kernel message buffer.
RHEL-08-010190V2R3A sticky bit must be set on all RHEL 8 public directories to prevent unauthorized and unintended information transferred via shared system resources.
RHEL-08-010375V2R3RHEL 8 must restrict access to the kernel message buffer.
RHEL-08-010376V2R3RHEL 8 must prevent kernel profiling by unprivileged users.
RHEL-09-232245V2R4A sticky bit must be set on all RHEL 9 public directories.
SLES-12-010460V3R2The sticky bit must be set on all SUSE operating system world-writable directories.
SLES-12-010375V3R2The SUSE operating system must restrict access to the kernel message buffer.
SLES-15-010300V2R4The sticky bit must be set on all SUSE operating system world-writable directories.
SLES-15-010375V2R4The SUSE operating system must restrict access to the kernel message buffer.
UBTU-18-010120V2R15The Ubuntu operating system must set a sticky bit on all public directories to prevent unauthorized and unintended information transferred via shared system resources.
UBTU-18-010510V2R15The Ubuntu operating system must restrict access to the kernel message buffer.
UBTU-20-010411V2R1The Ubuntu operating system must set a sticky bit on all public directories to prevent unauthorized and unintended information transferred via shared system resources.
UBTU-20-010401V2R1The Ubuntu operating system must restrict access to the kernel message buffer.
UBTU-22-213010V2R4Ubuntu 22.04 LTS must restrict access to the kernel message buffer.
UBTU-22-232145V2R4Ubuntu 22.04 LTS must set a sticky bit on all public directories to prevent unauthorized and unintended information transferred via shared system resources.
UBTU-24-600140V1R1Ubuntu 24.04 LTS must restrict access to the kernel message buffer.
UBTU-24-600150V1R1Ubuntu 24.04 LTS must set a sticky bit on all public directories to prevent unauthorized and unintended information transferred via shared system resources.
WN10-00-000060V3R4Non system-created file shares on a system must limit access to groups that require it.
WN10-CC-000155V3R4Solicited Remote Assistance must not be allowed.
WN10-CC-000275V3R4Local drives must be prevented from sharing with Remote Desktop Session Hosts.
WN10-EP-000310V3R4Windows 10 Kernel (Direct Memory Access) DMA Protection must be enabled.
WN10-SO-000150V3R4Anonymous enumeration of shares must be restricted.
WN10-SO-000165V3R4Anonymous access to Named Pipes and Shares must be restricted.
WN11-00-000060V2R3Non-system-created file shares on a system must limit access to groups that require it.
WN11-CC-000155V2R3Solicited Remote Assistance must not be allowed.
WN11-CC-000275V2R3Local drives must be prevented from sharing with Remote Desktop Session Hosts.
WN11-SO-000150V2R3Anonymous enumeration of shares must be restricted.
WN11-SO-000165V2R3Anonymous access to Named Pipes and Shares must be restricted.
WN16-00-000250V2R9Non-system-created file shares on a system must limit access to groups that require it.
WN16-CC-000380V2R9Local drives must be prevented from sharing with Remote Desktop Session Hosts.
WN16-DC-000120V2R9Data files owned by users must be on a different logical partition from the directory server data files.
WN16-SO-000270V2R9Anonymous enumeration of shares must not be allowed.
WN16-SO-000300V2R9Anonymous access to Named Pipes and Shares must be restricted.
WN19-00-000230V3R4Windows Server 2019 non-system-created file shares must limit access to groups that require it.
WN19-CC-000350V3R4Windows Server 2019 Remote Desktop Services must prevent drive redirection.
WN19-DC-000120V3R4Windows Server 2019 data files owned by users must be on a different logical partition from the directory server data files.
WN19-SO-000230V3R4Windows Server 2019 must not allow anonymous enumeration of shares.
WN19-SO-000250V3R4Windows Server 2019 must restrict anonymous access to Named Pipes and Shares.
WN22-00-000230V2R4Windows Server 2022 nonsystem-created file shares must limit access to groups that require it.
WN22-CC-000350V2R4Windows Server 2022 Remote Desktop Services must prevent drive redirection.
WN22-DC-000120V2R4Windows Server 2022 data files owned by users must be on a different logical partition from the directory server data files.
WN22-SO-000230V2R4Windows Server 2022 must not allow anonymous enumeration of shares.
WN22-SO-000250V2R4Windows Server 2022 must restrict anonymous access to Named Pipes and Shares.