SRG-OS-000420-GPOS-00186 Controls

STIG IDVersionTitleProduct
AZLX-23-002605V1R2Amazon Linux 2023 must protect against or limit the effects of denial-of-service (DoS) attacks by ensuring rate-limiting measures are configured on impacted network interfaces.Amazon Linux 2023
ALMA-09-042370V1R5AlmaLinux OS 9 must protect against or limit the effects of denial-of-service (DoS) attacks by ensuring rate-limiting measures on impacted network interfaces are implemented.AlmaLinux OS 9
ALMA-09-042480V1R5AlmaLinux OS 9 must be configured to use TCP syncookies.AlmaLinux OS 9
OL07-00-040510V3R5The Oracle Linux operating system must protect against or limit the effects of Denial of Service (DoS) attacks by validating the operating system is implementing rate-limiting measures on impacted network interfaces.Oracle Linux 7
OL09-00-006000V1R4OL 9 must protect against or limit the effects of denial-of-service (DoS) attacks by ensuring rate-limiting measures on impacted network interfaces are implemented.Oracle Linux 9
OL09-00-006050V1R4OL 9 must be configured to use TCP syncookies.Oracle Linux 9
RHEL-10-000530V1R1RHEL 10 must use a separate file system for user home directories (such as "/home" or an equivalent).Red Hat Enterprise Linux 10
RHEL-10-000540V1R1RHEL 10 must use a separate file system for "/tmp".Red Hat Enterprise Linux 10
RHEL-10-000550V1R1RHEL 10 must use a separate file system for "/var".Red Hat Enterprise Linux 10
RHEL-10-000560V1R1RHEL 10 must use a separate file system for "/var/log".Red Hat Enterprise Linux 10
RHEL-10-000570V1R1RHEL 10 must use a separate file system for "/var/tmp".Red Hat Enterprise Linux 10
RHEL-10-200643V1R1RHEL 10 must be configured so that the rsyslog daemon does not accept log messages from other servers unless the server is being used for log aggregation.Red Hat Enterprise Linux 10
RHEL-10-600180V1R1RHEL 10 must assign a home directory to all local interactive users in the "/etc/passwd" file.Red Hat Enterprise Linux 10
RHEL-10-600190V1R1RHEL 10 must ensure that all local interactive user home directories defined in the "/etc/passwd" file must exist.Red Hat Enterprise Linux 10
RHEL-10-700820V1R1RHEL 10 must prevent a user from overriding the Ctrl-Alt-Del sequence settings for the graphical user interface.Red Hat Enterprise Linux 10
RHEL-10-700830V1R1RHEL 10 must disable the ability of a user to accidentally press Ctrl-Alt-Del and cause a system to shut down or reboot.Red Hat Enterprise Linux 10
RHEL-10-800060V1R1RHEL 10 must have at least two name servers configured for systems using Domain Name Server (DNS) resolution.Red Hat Enterprise Linux 10
RHEL-10-800080V1R1RHEL 10 must be configured to use Transmission Control Protocol (TCP) syncookies.Red Hat Enterprise Linux 10
RHEL-10-800090V1R1RHEL 10 must ignore Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirect messages.Red Hat Enterprise Linux 10
RHEL-10-800100V1R1RHEL 10 must not forward Internet Protocol version 4 (IPv4) source-routed packets.Red Hat Enterprise Linux 10
RHEL-10-800110V1R1RHEL 10 must log Internet Protocol version 4 (IPv4) packets with impossible addresses.Red Hat Enterprise Linux 10
RHEL-10-800120V1R1RHEL 10 must log Internet Protocol version 4 (IPv4) packets with impossible addresses by default.Red Hat Enterprise Linux 10
RHEL-10-800130V1R1RHEL 10 must use reverse path filtering on all Internet Protocol version 4 (IPv4) interfaces.Red Hat Enterprise Linux 10
RHEL-10-800140V1R1RHEL 10 must prevent Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirect messages from being accepted.Red Hat Enterprise Linux 10
RHEL-10-800150V1R1RHEL 10 must not forward Internet Protocol version 4 (IPv4) source-routed packets by default.Red Hat Enterprise Linux 10
RHEL-10-800160V1R1RHEL 10 must use a reverse-path filter for Internet Protocol version 4 (IPv4) network traffic when possible by default.Red Hat Enterprise Linux 10
RHEL-10-800170V1R1RHEL 10 must not respond to Internet Control Message Protocol (ICMP) echoes sent to a broadcast address.Red Hat Enterprise Linux 10
RHEL-10-800180V1R1RHEL 10 must limit the number of bogus Internet Control Message Protocol (ICMP) response errors logs.Red Hat Enterprise Linux 10
RHEL-10-800190V1R1RHEL 10 must not send Internet Control Message Protocol (ICMP) redirects.Red Hat Enterprise Linux 10
RHEL-10-800200V1R1RHEL 10 must not allow interfaces to perform Internet Control Message Protocol (ICMP) redirects by default.Red Hat Enterprise Linux 10
RHEL-10-800210V1R1RHEL 10 must not enable Internet Protocol version 4 (IPv4) packet forwarding unless the system is a router.Red Hat Enterprise Linux 10
RHEL-10-800220V1R1RHEL 10 must not accept router advertisements on all Internet Protocol version 6 (IPv6) interfaces.Red Hat Enterprise Linux 10
RHEL-10-800230V1R1RHEL 10 must ignore IPv6 Internet Control Message Protocol (ICMP) redirect messages.Red Hat Enterprise Linux 10
RHEL-10-800240V1R1RHEL 10 must not forward Internet Protocol version 6 (IPv6) source-routed packets.Red Hat Enterprise Linux 10
RHEL-10-800250V1R1RHEL 10 must not enable Internet Protocol version 6 (IPv6) packet forwarding unless the system is a router.Red Hat Enterprise Linux 10
RHEL-10-800260V1R1RHEL 10 must not accept router advertisements on all Internet Protocol version 6 (IPv6) interfaces by default.Red Hat Enterprise Linux 10
RHEL-10-800270V1R1RHEL 10 must prevent Internet Protocol version 6 (IPv6) Internet Control Message Protocol (ICMP) redirect messages from being accepted.Red Hat Enterprise Linux 10
RHEL-10-800280V1R1RHEL 10 must not forward Internet Protocol version 6 (IPv6) source-routed packets by default.Red Hat Enterprise Linux 10
RHEL-10-800290V1R1RHEL 10 must protect against or limit the effects of denial-of-service (DoS) attacks by ensuring that rate-limiting measures on impacted network interfaces are implemented.Red Hat Enterprise Linux 10
RHEL-10-800300V1R1RHEL 10 must configure a DNS processing mode in Network Manager to avoid conflicts with other Domain Name Server (DNS) managers and to not leak DNS queries to untrusted networks.Red Hat Enterprise Linux 10
RHEL-08-040150V2R6A firewall must be able to protect against or limit the effects of Denial of Service (DoS) attacks by ensuring RHEL 8 can implement rate-limiting measures on impacted network interfaces.Red Hat Enterprise Linux 8
RHEL-09-251030V2R7RHEL 9 must protect against or limit the effects of denial-of-service (DoS) attacks by ensuring rate-limiting measures on impacted network interfaces are implemented.Red Hat Enterprise Linux 9
SLES-12-030040V3R4SuSEfirewall2 must protect against or limit the effects of Denial-of-Service (DoS) attacks on the SUSE operating system by implementing rate-limiting measures on impacted network interfaces.SUSE Linux Enterprise 12
TOSS-04-040480V2R3A firewall must be able to protect against or limit the effects of Denial of Service (DoS) attacks by ensuring TOSS can implement rate-limiting measures on impacted network interfaces.Tri-Lab Operating System Stack
UBTU-18-010512V2R15The Ubuntu operating system must configure the uncomplicated firewall to rate-limit impacted network interfaces.Ubuntu 18.04
UBTU-20-010446V2R3The Ubuntu operating system must configure the uncomplicated firewall to rate-limit impacted network interfaces.Ubuntu 20.04
UBTU-22-251025V2R7Ubuntu 22.04 LTS must configure the Uncomplicated Firewall (ufw) to rate-limit impacted network interfaces.Ubuntu 22.04
UBTU-24-600200V1R1Ubuntu 24.04 LTS must configure the uncomplicated firewall to rate-limit impacted network interfaces.Ubuntu 24.04
WN10-CC-000035V3R6The system must be configured to ignore NetBIOS name release requests except from WINS servers.Microsoft Windows 10
WN10-CC-000220V3R6Turning off File Explorer heap termination on corruption must be disabled.Microsoft Windows 10
WN11-CC-000035V2R5The system must be configured to ignore NetBIOS name release requests except from WINS servers.Microsoft Windows 11
WN11-CC-000220V2R5File Explorer heap termination on corruption must be disabled.Microsoft Windows 11
WN16-CC-000070V2R9Windows Server 2016 must be configured to ignore NetBIOS name release requests except from WINS servers.Microsoft Windows Server 2016
WN19-CC-000060V3R7Windows Server 2019 must be configured to ignore NetBIOS name release requests except from WINS servers.Microsoft Windows Server 2019
WN22-CC-000060V2R7Windows Server 2022 must be configured to ignore NetBIOS name release requests except from WINS servers.Microsoft Windows Server 2022
WN25-CC-000060V1R1Windows Server 2025 must be configured to ignore NetBIOS name release requests except from WINS servers.Microsoft Windows Server 2025