SRG-OS-000445-GPOS-00199 Controls

STIG IDVersionTitleProduct
AZLX-23-002445V1R2Amazon Linux 2023 must enable the SELinux targeted policy.Amazon Linux 2023
ALMA-09-045230V1R5AlmaLinux OS 9 must enable the SELinux targeted policy.AlmaLinux OS 9
ALMA-09-045340V1R5AlmaLinux OS 9 must have the Advanced Intrusion Detection Environment (AIDE) package installed.AlmaLinux OS 9
APPL-14-005100V2R4The macOS system must ensure secure boot level set to full.macOS 14 - Sonoma
APPL-15-005100V1R6The macOS system must ensure Secure Boot level is set to "full".macOS 15 - Sequoia
OL07-00-020210V3R5The Oracle Linux operating system must enable SELinux.Oracle Linux 7
OL07-00-020220V3R5The Oracle Linux operating system must enable the SELinux targeted policy.Oracle Linux 7
OL07-00-020029V3R5The Oracle Linux operating system must use a file integrity tool to verify correct operation of all security functions.Oracle Linux 7
OL08-00-010450V2R7OL 8 must enable the SELinux targeted policy.Oracle Linux 8
OL08-00-010359V2R7The OL 8 operating system must use a file integrity tool to verify correct operation of all security functions.Oracle Linux 8
OL09-00-000060V1R4OL 9 must use a Linux Security Module configured to enforce limits on system services.Oracle Linux 9
OL09-00-000065V1R4OL 9 must enable the SELinux targeted policy.Oracle Linux 9
RHEL-10-200630V1R1RHEL 10 must have the Advanced Intrusion Detection Environment (AIDE) package installed.Red Hat Enterprise Linux 10
RHEL-10-400130V1R1RHEL 10 must be configured so that cron configuration file directories are owned by root.Red Hat Enterprise Linux 10
RHEL-10-600020V1R1RHEL 10 must not assign an interactive login shell for system accounts.Red Hat Enterprise Linux 10
RHEL-10-600520V1R1RHEL 10 must restrict privilege elevation to authorized personnel.Red Hat Enterprise Linux 10
RHEL-10-700400V1R1RHEL 10 must enable the SELinux targeted policy.Red Hat Enterprise Linux 10
RHEL-10-700420V1R1RHEL 10 must use a Linux Security Module configured to enforce limits on system services.Red Hat Enterprise Linux 10
RHEL-10-700500V1R1RHEL 10 must be configured so that Secure Shell (SSH) public host key files have mode "0644" or less permissive.Red Hat Enterprise Linux 10
RHEL-10-700530V1R1RHEL 10 must be configured so that the Secure Shell (SSH) daemon does not allow rhosts authentication.Red Hat Enterprise Linux 10
RHEL-10-700540V1R1RHEL 10 must be configured so that the Secure Shell (SSH) daemon does not allow known hosts authentication.Red Hat Enterprise Linux 10
RHEL-10-700550V1R1RHEL 10 must be configured so that the Secure Shell (SSH) daemon disables remote X connections for interactive users.Red Hat Enterprise Linux 10
RHEL-10-700560V1R1RHEL 10 must be configured so that the Secure Shell (SSH) daemon performs strict mode checking of home directory configuration files.Red Hat Enterprise Linux 10
RHEL-10-700570V1R1RHEL 10 must be configured so that the Secure Shell (SSH) daemon displays the date and time of the last successful account login upon an SSH login.Red Hat Enterprise Linux 10
RHEL-10-700580V1R1RHEL 10 must be configured so that the Secure Shell (SSH) daemon prevents remote hosts from connecting to the proxy display.Red Hat Enterprise Linux 10
RHEL-10-700810V1R1RHEL 10 must prevent a user from overriding the disable-restart-buttons setting for the graphical user interface.Red Hat Enterprise Linux 10
RHEL-07-020210V3R9The Red Hat Enterprise Linux operating system must enable SELinux.Red Hat Enterprise Linux 7
RHEL-07-020220V3R9The Red Hat Enterprise Linux operating system must enable the SELinux targeted policy.Red Hat Enterprise Linux 7
RHEL-07-020029V3R9The Red Hat Enterprise Linux operating system must use a file integrity tool to verify correct operation of all security functions.Red Hat Enterprise Linux 7
RHEL-08-010450V2R6RHEL 8 must enable the SELinux targeted policy.Red Hat Enterprise Linux 8
RHEL-08-010359V2R6The RHEL 8 operating system must use a file integrity tool to verify correct operation of all security functions.Red Hat Enterprise Linux 8
RHEL-08-010455V2R6RHEL 8 must elevate the SELinux context when an administrator calls the sudo command.Red Hat Enterprise Linux 8
RHEL-09-431010V2R7RHEL 9 must use a Linux Security Module configured to enforce limits on system services.Red Hat Enterprise Linux 9
RHEL-09-431015V2R7RHEL 9 must enable the SELinux targeted policy.Red Hat Enterprise Linux 9
RHEL-09-431016V2R7RHEL 9 must elevate the SELinux context when an administrator calls the sudo command.Red Hat Enterprise Linux 9
TOSS-04-040510V2R3TOSS must enable the "SELinux" targeted policy.Tri-Lab Operating System Stack
UBTU-18-010515V2R15The Ubuntu operating system must use a file integrity tool to verify correct operation of all security functions.Ubuntu 18.04
UBTU-20-010450V2R3The Ubuntu operating system must use a file integrity tool to verify correct operation of all security functions.Ubuntu 20.04
UBTU-22-651010V2R7Ubuntu 22.04 LTS must use a file integrity tool to verify correct operation of all security functions.Ubuntu 22.04
UBTU-22-651015V2R7Ubuntu 22.04 LTS must configure Advanced Intrusion Detection Environment (AIDE) to perform file integrity checking on the file system.Ubuntu 22.04
UBTU-24-100100V1R1Ubuntu 24.04 LTS must use a file integrity tool to verify correct operation of all security functions.Ubuntu 24.04
UBTU-24-100110V1R1Ubuntu 24.04 LTS must configure AIDE to preform file integrity checking on the file system.Ubuntu 24.04