STIG-A-View
STIG ID | Version | Title | Product |
---|---|---|---|
ALMA-09-042150 | V1R2 | Any AlmaLinux OS 9 world-writable directories must be owned by root, sys, bin, or an application user. | |
ALMA-09-042260 | V1R2 | A sticky bit must be set on all AlmaLinux OS 9 public directories. | |
OL07-00-010375 | V3R2 | The Oracle Linux operating system must restrict access to the kernel message buffer. | |
OL08-00-010190 | V2R4 | A sticky bit must be set on all OL 8 public directories to prevent unauthorized and unintended information transferred via shared system resources. | |
OL08-00-010375 | V2R4 | OL 8 must restrict access to the kernel message buffer. | |
OL08-00-010376 | V2R4 | OL 8 must prevent kernel profiling by unprivileged users. | |
OL09-00-002510 | V1R1 | OL 9 must be configured so that a sticky bit must be set on all public directories. | |
OL09-00-002516 | V1R1 | OL 9 world-writable directories must be owned by root, sys, bin, or an application user. | |
RHEL-07-010375 | V3R14 | The Red Hat Enterprise Linux operating system must restrict access to the kernel message buffer. | |
RHEL-08-010190 | V2R3 | A sticky bit must be set on all RHEL 8 public directories to prevent unauthorized and unintended information transferred via shared system resources. | |
RHEL-08-010375 | V2R3 | RHEL 8 must restrict access to the kernel message buffer. | |
RHEL-08-010376 | V2R3 | RHEL 8 must prevent kernel profiling by unprivileged users. | |
RHEL-09-232245 | V2R4 | A sticky bit must be set on all RHEL 9 public directories. | |
SLES-12-010460 | V3R2 | The sticky bit must be set on all SUSE operating system world-writable directories. | |
SLES-12-010375 | V3R2 | The SUSE operating system must restrict access to the kernel message buffer. | |
SLES-15-010300 | V2R4 | The sticky bit must be set on all SUSE operating system world-writable directories. | |
SLES-15-010375 | V2R4 | The SUSE operating system must restrict access to the kernel message buffer. | |
UBTU-18-010120 | V2R15 | The Ubuntu operating system must set a sticky bit on all public directories to prevent unauthorized and unintended information transferred via shared system resources. | |
UBTU-18-010510 | V2R15 | The Ubuntu operating system must restrict access to the kernel message buffer. | |
UBTU-20-010411 | V2R1 | The Ubuntu operating system must set a sticky bit on all public directories to prevent unauthorized and unintended information transferred via shared system resources. | |
UBTU-20-010401 | V2R1 | The Ubuntu operating system must restrict access to the kernel message buffer. | |
UBTU-22-213010 | V2R4 | Ubuntu 22.04 LTS must restrict access to the kernel message buffer. | |
UBTU-22-232145 | V2R4 | Ubuntu 22.04 LTS must set a sticky bit on all public directories to prevent unauthorized and unintended information transferred via shared system resources. | |
UBTU-24-600140 | V1R1 | Ubuntu 24.04 LTS must restrict access to the kernel message buffer. | |
UBTU-24-600150 | V1R1 | Ubuntu 24.04 LTS must set a sticky bit on all public directories to prevent unauthorized and unintended information transferred via shared system resources. | |
WN10-00-000060 | V3R4 | Non system-created file shares on a system must limit access to groups that require it. | |
WN10-CC-000155 | V3R4 | Solicited Remote Assistance must not be allowed. | |
WN10-CC-000275 | V3R4 | Local drives must be prevented from sharing with Remote Desktop Session Hosts. | |
WN10-EP-000310 | V3R4 | Windows 10 Kernel (Direct Memory Access) DMA Protection must be enabled. | |
WN10-SO-000150 | V3R4 | Anonymous enumeration of shares must be restricted. | |
WN10-SO-000165 | V3R4 | Anonymous access to Named Pipes and Shares must be restricted. | |
WN11-00-000060 | V2R3 | Non-system-created file shares on a system must limit access to groups that require it. | |
WN11-CC-000155 | V2R3 | Solicited Remote Assistance must not be allowed. | |
WN11-CC-000275 | V2R3 | Local drives must be prevented from sharing with Remote Desktop Session Hosts. | |
WN11-SO-000150 | V2R3 | Anonymous enumeration of shares must be restricted. | |
WN11-SO-000165 | V2R3 | Anonymous access to Named Pipes and Shares must be restricted. | |
WN16-00-000250 | V2R9 | Non-system-created file shares on a system must limit access to groups that require it. | |
WN16-CC-000380 | V2R9 | Local drives must be prevented from sharing with Remote Desktop Session Hosts. | |
WN16-DC-000120 | V2R9 | Data files owned by users must be on a different logical partition from the directory server data files. | |
WN16-SO-000270 | V2R9 | Anonymous enumeration of shares must not be allowed. | |
WN16-SO-000300 | V2R9 | Anonymous access to Named Pipes and Shares must be restricted. | |
WN19-00-000230 | V3R4 | Windows Server 2019 non-system-created file shares must limit access to groups that require it. | |
WN19-CC-000350 | V3R4 | Windows Server 2019 Remote Desktop Services must prevent drive redirection. | |
WN19-DC-000120 | V3R4 | Windows Server 2019 data files owned by users must be on a different logical partition from the directory server data files. | |
WN19-SO-000230 | V3R4 | Windows Server 2019 must not allow anonymous enumeration of shares. | |
WN19-SO-000250 | V3R4 | Windows Server 2019 must restrict anonymous access to Named Pipes and Shares. | |
WN22-00-000230 | V2R4 | Windows Server 2022 nonsystem-created file shares must limit access to groups that require it. | |
WN22-CC-000350 | V2R4 | Windows Server 2022 Remote Desktop Services must prevent drive redirection. | |
WN22-DC-000120 | V2R4 | Windows Server 2022 data files owned by users must be on a different logical partition from the directory server data files. | |
WN22-SO-000230 | V2R4 | Windows Server 2022 must not allow anonymous enumeration of shares. | |
WN22-SO-000250 | V2R4 | Windows Server 2022 must restrict anonymous access to Named Pipes and Shares. |