General Purpose Operating System Security Requirements Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates +13 −8 ✎ 12
Comparison against the immediately-prior release (V2R7). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Added rules 13
- V-263650 Medium The operating system must disable accounts when the accounts are no longer associated to a user.
- V-263651 Medium The operating system must prohibit the use or connection of unauthorized hardware components.
- V-263652 Medium The operating system must implement multifactor authentication for local, network, and/or remote access to privileged accounts and/or nonprivileged accounts such that the device meets organization-defined strength of mechanism requirements.
- V-263653 Medium The operating system must, for password-based authentication, verify when users create or update passwords the passwords are not found on the list of commonly-used, expected, or compromised passwords in IA-5 (1) (a).
- V-263654 Medium The operating system must for password-based authentication, require immediate selection of a new password upon account recovery.
- V-263655 Medium The operating system must for password-based authentication, allow user selection of long passwords and passphrases, including spaces and all printable characters.
- V-263656 Medium The operating system must, for password-based authentication, employ automated tools to assist the user in selecting strong password authenticators.
- V-263657 Medium The operating system must accept only external credentials that are NIST-compliant.
- V-263658 Medium The operating system must monitor the use of maintenance tools that execute with increased privilege.
- V-263659 Medium The operating system must include only approved trust anchors in trust stores or certificate stores managed by the organization.
- V-263660 Medium The operating system must provide protected storage for cryptographic keys with organization-defined safeguards and/or hardware protected key store.
- V-263661 Medium The operating system must synchronize system clocks within and between systems or system components.
- V-263662 Medium The operating system must employ automated patch management tools to facilitate flaw remediation to the organization-defined system components.
Removed rules 8
- V-203633 Medium The operating system must prohibit password reuse for a minimum of five generations.
- V-203654 Medium The operating system must terminate all sessions and network connections related to nonlocal maintenance when nonlocal maintenance is completed.
- V-203662 Medium The operating system must employ automated mechanisms to determine the state of system components with regard to flaw remediation using the following frequency: continuously, 30 days, and annually, for external scans by Computer Network Defense Service Provider (CNDSP).
- V-203723 Medium The operating system must require users to re-authenticate for privilege escalation.
- V-203724 Medium The operating system must require users to re-authenticate when changing roles.
- V-203725 Medium The operating system must require users to re-authenticate when changing authenticators.
- V-203726 Medium The operating system must require devices to re-authenticate when changing authenticators.
- V-203732 Medium The operating system must allow the use of a temporary password for system logons with an immediate change to a permanent password.
Content changes 12
- V-203625 Medium checkfix The operating system must enforce password complexity by requiring that at least one uppercase character be used.
- V-203626 Medium checkfix The operating system must enforce password complexity by requiring that at least one lowercase character be used.
- V-203628 Medium description The operating system must require the change of at least 50 percent of the total number of characters when passwords are changed.
- V-203632 Medium description Operating systems must enforce a 60-day maximum password lifetime restriction.
- V-203642 Medium description The operating system must use multifactor authentication for local access to privileged accounts.
- V-203643 Medium descriptioncheckfix The operating system must use multifactor authentication for local access to nonprivileged accounts.
- V-203644 Medium description The operating system must require individuals to be authenticated with an individual authenticator prior to using a group authenticator.
- V-203646 Medium descriptioncheckfix The operating system must implement replay-resistant authentication mechanisms for network access to nonprivileged accounts.
- V-203691 Medium descriptioncheckfix The operating system must notify system administrators (SAs) and information system security officers (ISSOs) of account enabling actions.
- V-203711 Medium checkfix The operating system must, for networked systems, compare internal information system clocks at least every 24 hours with a server which is synchronized to one of the redundant United States Naval Observatory (USNO) time servers, or a time server designated for the appropriate DOD network (NIPRNet/SIPRNet), and/or the Global Positioning System (GPS).
- V-203720 High descriptionfix The operating system must prevent the installation of patches, service packs, device drivers, or operating system components without verification they have been digitally signed using a certificate that is recognized and approved by the organization.
- V-203727 Medium description The operating system must implement multifactor authentication for remote access to privileged accounts in such a way that one of the factors is provided by a device separate from the system gaining access.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000015
- Version
- SRG-OS-000001-GPOS-00001
- Vuln IDs
-
- V-203591
- V-56571
- Rule IDs
-
- SV-203591r958362_rule
- SV-70831
Checks: C-3716r557029_chk
Verify the operating system provides automated mechanisms for supporting account management functions. If it does not, this is a finding.
Fix: F-3716r557030_fix
Configure the operating system to provide automated mechanisms for supporting account management functions.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000016
- Version
- SRG-OS-000002-GPOS-00002
- Vuln IDs
-
- V-203592
- V-56575
- Rule IDs
-
- SV-203592r958364_rule
- SV-70835
Checks: C-3717r557032_chk
Verify the operating system automatically removes or disables local temporary user accounts after 72 hours. If it does not, this is a finding.
Fix: F-3717r557033_fix
Configure the operating system to automatically remove or disable local temporary user accounts after 72 hours.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000018
- Version
- SRG-OS-000004-GPOS-00004
- Vuln IDs
-
- V-203593
- V-56577
- Rule IDs
-
- SV-203593r958368_rule
- SV-70837
Checks: C-3718r557035_chk
Verify the operating system automatically audits account creation. If it does not, this is a finding.
Fix: F-3718r557036_fix
Configure the operating system to automatically audit account creation.
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-000044
- Version
- SRG-OS-000021-GPOS-00005
- Vuln IDs
-
- V-203594
- V-56579
- Rule IDs
-
- SV-203594r958388_rule
- SV-70839
Checks: C-3719r557038_chk
Verify that the operating system enforces the limit of three consecutive invalid logon attempts by a user during a 15-minute time period. If it does not, this is a finding.
Fix: F-3719r557039_fix
Configure the operating system to enforce the limit of three consecutive invalid logon attempts by a user during a 15-minute time period.
- RMF Control
- AC-8
- Severity
- M
- CCI
- CCI-000048
- Version
- SRG-OS-000023-GPOS-00006
- Vuln IDs
-
- V-203595
- V-56585
- Rule IDs
-
- SV-203595r958390_rule
- SV-70845
Checks: C-3720r557041_chk
Verify the operating system displays the Standard Mandatory DoD Notice and Consent Banner before granting access to the system. The banner must be formatted in accordance with applicable DoD policy. Use the following verbiage for operating systems that can accommodate banners of 1300 characters: "You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device attached to this IS), you consent to the following conditions: -The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. -At any time, the USG may inspect and seize data stored on this IS. -Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG-authorized purpose. -This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy. -Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details." Use the following verbiage for operating systems that have severe limitations on the number of characters that can be displayed in the banner: "I've read & consent to terms in IS user agreem't." If it does not, this is a finding.
Fix: F-3720r557042_fix
Configure the operating system to display the Standard Mandatory DoD Notice and Consent Banner before granting access to the system. The banner must be formatted in accordance with applicable DoD policy. Use the following verbiage for operating systems that can accommodate banners of 1300 characters: "You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device attached to this IS), you consent to the following conditions: -The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. -At any time, the USG may inspect and seize data stored on this IS. -Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG-authorized purpose. -This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy. -Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details." Use the following verbiage for operating systems that have severe limitations on the number of characters that can be displayed in the banner: "I've read & consent to terms in IS user agreem't." If it does not, this is a finding.
- RMF Control
- AC-8
- Severity
- M
- CCI
- CCI-000050
- Version
- SRG-OS-000024-GPOS-00007
- Vuln IDs
-
- V-203596
- V-56593
- Rule IDs
-
- SV-203596r958392_rule
- SV-70853
Checks: C-3721r557044_chk
Verify the operating system displays the Standard Mandatory DoD Notice and Consent Banner until users acknowledge the usage conditions and take explicit actions to log on for further access. If it does not, this is a finding.
Fix: F-3721r557045_fix
Configure the operating system to display the Standard Mandatory DoD Notice and Consent Banner until users acknowledge the usage conditions and take explicit actions to log on for further access.
- RMF Control
- AC-10
- Severity
- L
- CCI
- CCI-000054
- Version
- SRG-OS-000027-GPOS-00008
- Vuln IDs
-
- V-203597
- V-56629
- Rule IDs
-
- SV-203597r958398_rule
- SV-70889
Checks: C-3722r557047_chk
Verify the operating system limits the number of concurrent sessions to ten for all accounts and/or account types. If it does not, this is a finding.
Fix: F-3722r557048_fix
Configure the operating system to limit the number of concurrent sessions to ten for all accounts and/or account types.
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000056
- Version
- SRG-OS-000028-GPOS-00009
- Vuln IDs
-
- V-203598
- V-56631
- Rule IDs
-
- SV-203598r958400_rule
- SV-70891
Checks: C-3723r557050_chk
Verify the operating system retains a user's session lock until that user reestablishes access using established identification and authentication procedures. If it does not, this is a finding.
Fix: F-3723r557051_fix
Configure the operating system to retain a user's session lock until that user reestablishes access using established identification and authentication procedures.
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000057
- Version
- SRG-OS-000029-GPOS-00010
- Vuln IDs
-
- V-203599
- V-56633
- Rule IDs
-
- SV-203599r958402_rule
- SV-70893
Checks: C-3724r557053_chk
Verify the operating system initiates a session lock after a 15-minute period of inactivity for all connection types. If it does not, this is a finding.
Fix: F-3724r557054_fix
Configure the operating system to initiate a session lock after a 15-minute period of inactivity for all connection types.
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000057
- Version
- SRG-OS-000030-GPOS-00011
- Vuln IDs
-
- V-203600
- V-56635
- Rule IDs
-
- SV-203600r982194_rule
- SV-70895
Checks: C-3725r557056_chk
Verify the operating system provides the capability for users to directly initiate a session lock for all connection types. If it does not, this is a finding.
Fix: F-3725r557057_fix
Configure the operating system to provide the capability for users to directly initiate a session lock for all connection types.
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000060
- Version
- SRG-OS-000031-GPOS-00012
- Vuln IDs
-
- V-203601
- V-56637
- Rule IDs
-
- SV-203601r958404_rule
- SV-70897
Checks: C-3726r557059_chk
Verify the operating system conceals, via the session lock, information previously visible on the display with a publicly viewable image. If it does not, this is a finding.
Fix: F-3726r557060_fix
Configure the operating system to conceal, via the session lock, information previously visible on the display with a publicly viewable image.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000067
- Version
- SRG-OS-000032-GPOS-00013
- Vuln IDs
-
- V-203602
- V-56639
- Rule IDs
-
- SV-203602r958406_rule
- SV-70899
Checks: C-3727r557062_chk
Verify the operating system monitors remote access methods. If it does not, this is a finding.
Fix: F-3727r557063_fix
Configure the operating system to monitor remote access methods.
- RMF Control
- AC-17
- Severity
- H
- CCI
- CCI-000068
- Version
- SRG-OS-000033-GPOS-00014
- Vuln IDs
-
- V-203603
- V-56641
- Rule IDs
-
- SV-203603r958408_rule
- SV-70901
Checks: C-3728r557065_chk
Verify the operating system implements DoD-approved encryption to protect the confidentiality of remote access sessions. If it does not, this is a finding.
Fix: F-3728r557066_fix
Configure the operating system to implement DoD-approved encryption to protect the confidentiality of remote access sessions.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- SRG-OS-000037-GPOS-00015
- Vuln IDs
-
- V-203604
- V-56647
- Rule IDs
-
- SV-203604r958412_rule
- SV-70907
Checks: C-3729r557068_chk
Verify the operating system produces audit records containing information to establish what type of events occurred. If it does not, this is a finding.
Fix: F-3729r557069_fix
Configure the operating system to produce audit records containing information to establish what type of events occurred.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000131
- Version
- SRG-OS-000038-GPOS-00016
- Vuln IDs
-
- V-203605
- V-56649
- Rule IDs
-
- SV-203605r958414_rule
- SV-70909
Checks: C-3730r557071_chk
Verify the operating system produces audit records containing information to establish when (date and time) the events occurred. If it does not, this is a finding.
Fix: F-3730r557072_fix
Configure the operating system to produce audit records containing information to establish when (date and time) the events occurred.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000132
- Version
- SRG-OS-000039-GPOS-00017
- Vuln IDs
-
- V-203606
- V-56651
- Rule IDs
-
- SV-203606r958416_rule
- SV-70911
Checks: C-3731r557074_chk
Verify the operating system produces audit records containing information to establish where the events occurred. If it does not, this is a finding.
Fix: F-3731r557075_fix
Configure the operating system to produce audit records containing information to establish where the events occurred.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000133
- Version
- SRG-OS-000040-GPOS-00018
- Vuln IDs
-
- V-203607
- V-56653
- Rule IDs
-
- SV-203607r958418_rule
- SV-70913
Checks: C-3732r557077_chk
Verify the operating system produces audit records containing information to establish the source of the events. If it does not, this is a finding.
Fix: F-3732r557078_fix
Configure the operating system to produce audit records containing information to establish the source of the events.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000134
- Version
- SRG-OS-000041-GPOS-00019
- Vuln IDs
-
- V-203608
- V-56655
- Rule IDs
-
- SV-203608r958420_rule
- SV-70915
Checks: C-3733r557080_chk
Verify the operating system produces audit records containing information to establish the outcome of the events. If it does not, this is a finding.
Fix: F-3733r557081_fix
Configure the operating system to produce audit records containing information to establish the outcome of the events.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000135
- Version
- SRG-OS-000042-GPOS-00020
- Vuln IDs
-
- V-203609
- V-56657
- Rule IDs
-
- SV-203609r958422_rule
- SV-70917
Checks: C-3734r557083_chk
Verify the operating system generates audit records containing the full-text recording of privileged commands. If it does not, this is a finding.
Fix: F-3734r557084_fix
Configure the operating system to generate audit records containing the full-text recording of privileged commands.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000135
- Version
- SRG-OS-000042-GPOS-00021
- Vuln IDs
-
- V-203610
- V-56659
- Rule IDs
-
- SV-203610r958422_rule
- SV-70919
Checks: C-3735r557086_chk
Verify the operating system produces audit records containing the individual identities of group account users. If it does not, this is a finding.
Fix: F-3735r557087_fix
Configure the operating system to produce audit records containing the individual identities of group account users.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-000139
- Version
- SRG-OS-000046-GPOS-00022
- Vuln IDs
-
- V-203611
- V-56661
- Rule IDs
-
- SV-203611r958424_rule
- SV-70921
Checks: C-3736r557089_chk
Verify the operating system alerts the ISSO and SA (at a minimum) in the event of an audit processing failure. If it does not, this is a finding.
Fix: F-3736r557090_fix
Configure the operating system to alert the ISSO and SA (at a minimum) in the event of an audit processing failure.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-000140
- Version
- SRG-OS-000047-GPOS-00023
- Vuln IDs
-
- V-203612
- V-56663
- Rule IDs
-
- SV-203612r958426_rule
- SV-70923
Checks: C-3737r557092_chk
Verify the operating system shuts down by default upon audit failure (unless availability is an overriding concern). If it does not, this is a finding.
Fix: F-3737r557093_fix
Configure the operating system to shut down by default upon audit failure (unless availability is an overriding concern).
- RMF Control
- AU-6
- Severity
- M
- CCI
- CCI-000154
- Version
- SRG-OS-000051-GPOS-00024
- Vuln IDs
-
- V-203613
- V-56665
- Rule IDs
-
- SV-203613r958428_rule
- SV-70925
Checks: C-3738r557095_chk
Verify the operating system provides the capability to centrally review and analyze audit records from multiple components within the system. If it does not, this is a finding.
Fix: F-3738r557096_fix
Configure the operating system to provide the capability to centrally review and analyze audit records from multiple components within the system.
- RMF Control
- AU-7
- Severity
- M
- CCI
- CCI-000158
- Version
- SRG-OS-000054-GPOS-00025
- Vuln IDs
-
- V-203614
- V-56667
- Rule IDs
-
- SV-203614r958430_rule
- SV-70927
Checks: C-3739r557098_chk
Verify the operating system provides the capability to filter audit records for events of interest based upon all audit fields within audit records. If it does not, this is a finding.
Fix: F-3739r557099_fix
Configure the operating system to provide the capability to filter audit records for events of interest based upon all audit fields within audit records.
- RMF Control
- AU-8
- Severity
- M
- CCI
- CCI-000159
- Version
- SRG-OS-000055-GPOS-00026
- Vuln IDs
-
- V-203615
- V-56669
- Rule IDs
-
- SV-203615r958432_rule
- SV-70929
Checks: C-3740r557101_chk
Verify the operating system uses internal system clocks to generate time stamps for audit records. If it does not, this is a finding.
Fix: F-3740r557102_fix
Configure the operating system to use internal system clocks to generate time stamps for audit records.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- SRG-OS-000057-GPOS-00027
- Vuln IDs
-
- V-203616
- V-56671
- Rule IDs
-
- SV-203616r958434_rule
- SV-70931
Checks: C-3741r557572_chk
Verify the operating system protects audit information from unauthorized read access. If it does not, this is a finding.
Fix: F-3741r557573_fix
Configure the operating system to protect audit information from unauthorized read access.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000163
- Version
- SRG-OS-000058-GPOS-00028
- Vuln IDs
-
- V-203617
- V-56673
- Rule IDs
-
- SV-203617r958436_rule
- SV-70933
Checks: C-3742r557575_chk
Verify the operating system protects audit information from unauthorized modification. If it does not, this is a finding.
Fix: F-3742r557576_fix
Configure the operating system to protect audit information from unauthorized modification.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000164
- Version
- SRG-OS-000059-GPOS-00029
- Vuln IDs
-
- V-203618
- V-56675
- Rule IDs
-
- SV-203618r958438_rule
- SV-70935
Checks: C-3743r557578_chk
Verify the operating system protects audit information from unauthorized deletion. If it does not, this is a finding.
Fix: F-3743r557579_fix
Configure the operating system to protect audit information from unauthorized deletion.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- SRG-OS-000062-GPOS-00031
- Vuln IDs
-
- V-203619
- V-56677
- Rule IDs
-
- SV-203619r958442_rule
- SV-70937
Checks: C-3744r557581_chk
Verify the operating system provides audit record generation capability for DoD-defined auditable events for all operating system components. DoD has defined the list of events for which the operating system will provide an audit record generation capability as the following: 1) Successful and unsuccessful attempts to access, modify, or delete privileges, security objects, security levels, or categories of information (e.g., classification levels); 2) Access actions, such as successful and unsuccessful logon attempts, privileged activities or other system-level access, starting and ending time for user access to the system, concurrent logons from different workstations, successful and unsuccessful accesses to objects, all program initiations, and all direct access to the information system; 3) All account creations, modifications, disabling, and terminations; and 4) All kernel module load, unload, and restart actions. If it does not, this is a finding.
Fix: F-3744r557582_fix
Configure the operating system to provide audit record generation capability for DoD-defined auditable events for all operating system components. DoD has defined the list of events for which the operating system will provide an audit record generation capability as the following: 1) Successful and unsuccessful attempts to access, modify, or delete privileges, security objects, security levels, or categories of information (e.g., classification levels); 2) Access actions, such as successful and unsuccessful logon attempts, privileged activities or other system-level access, starting and ending time for user access to the system, concurrent logons from different workstations, successful and unsuccessful accesses to objects, all program initiations, and all direct access to the information system; 3) All account creations, modifications, disabling, and terminations; and 4) All kernel module load, unload, and restart actions.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000171
- Version
- SRG-OS-000063-GPOS-00032
- Vuln IDs
-
- V-203620
- V-56679
- Rule IDs
-
- SV-203620r958444_rule
- SV-70939
Checks: C-3745r557584_chk
Verify the operating system allows only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited. If it does not, this is a finding.
Fix: F-3745r557585_fix
Configure the operating system to allow only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-OS-000064-GPOS-00033
- Vuln IDs
-
- V-203621
- V-56681
- Rule IDs
-
- SV-203621r958446_rule
- SV-70941
Checks: C-3746r557587_chk
Verify the operating system generates audit records when successful/unsuccessful attempts to access privileges occur. If it does not, this is a finding.
Fix: F-3746r557588_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to access privileges occur.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000185
- Version
- SRG-OS-000066-GPOS-00034
- Vuln IDs
-
- V-203622
- V-56683
- Rule IDs
-
- SV-203622r958448_rule
- SV-70943
Checks: C-3747r557590_chk
Verify the operating system, for PKI-based authentication, validates certificates by constructing a certification path (which includes status information) to an accepted trust anchor. If it does not, this is a finding.
Fix: F-3747r557591_fix
Configure the operating system, for PKI-based authentication, to validate certificates by constructing a certification path (which includes status information) to an accepted trust anchor.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000186
- Version
- SRG-OS-000067-GPOS-00035
- Vuln IDs
-
- V-203623
- V-56685
- Rule IDs
-
- SV-203623r958450_rule
- SV-70945
Checks: C-3748r557593_chk
Verify the operating system, for PKI-based authentication, enforces authorized access to the corresponding private key. If it does not, this is a finding.
Fix: F-3748r557594_fix
Configure the operating system, for PKI-based authentication, to enforce authorized access to the corresponding private key.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000187
- Version
- SRG-OS-000068-GPOS-00036
- Vuln IDs
-
- V-203624
- V-56687
- Rule IDs
-
- SV-203624r958452_rule
- SV-70947
Checks: C-3749r557596_chk
Verify the operating system maps the authenticated identity to the user or group account for PKI-based authentication. If it does not, this is a finding.
Fix: F-3749r557597_fix
Configure the operating system to map the authenticated identity to the user or group account for PKI-based authentication.
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- SRG-OS-000069-GPOS-00037
- Vuln IDs
-
- V-203625
- V-56689
- Rule IDs
-
- SV-203625r982195_rule
- SV-70949
Checks: C-3750r982120_chk
Verify the operating system enforces password complexity by requiring that at least one uppercase character be used. If it does not, this is a finding.
Fix: F-3750r982121_fix
Configure the operating system to enforce password complexity by requiring that at least one uppercase character be used.
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- SRG-OS-000070-GPOS-00038
- Vuln IDs
-
- V-203626
- V-56691
- Rule IDs
-
- SV-203626r982196_rule
- SV-70951
Checks: C-3751r982123_chk
Verify the operating system enforces password complexity by requiring that at least one lowercase character be used. If it does not, this is a finding.
Fix: F-3751r982124_fix
Configure the operating system to enforce password complexity by requiring that at least one lowercase character be used.
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- SRG-OS-000071-GPOS-00039
- Vuln IDs
-
- V-203627
- V-56693
- Rule IDs
-
- SV-203627r982197_rule
- SV-70953
Checks: C-3752r557605_chk
Verify the operating system enforces password complexity by requiring that at least one numeric character be used. If it does not, this is a finding.
Fix: F-3752r557606_fix
Configure the operating system to enforce password complexity by requiring that at least one numeric character be used.
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- SRG-OS-000072-GPOS-00040
- Vuln IDs
-
- V-203628
- V-56695
- Rule IDs
-
- SV-203628r982198_rule
- SV-70955
Checks: C-3753r557608_chk
Verify the operating system requires the change of at least eight of the total number of characters when passwords are changed. If it does not, this is a finding.
Fix: F-3753r557609_fix
Configure the operating system to require the change of at least eight of the total number of characters when passwords are changed.
- RMF Control
- Severity
- H
- CCI
- CCI-004062
- Version
- SRG-OS-000073-GPOS-00041
- Vuln IDs
-
- V-203629
- V-56697
- Rule IDs
-
- SV-203629r982199_rule
- SV-70957
Checks: C-3754r557611_chk
Verify the operating system stores only encrypted representations of passwords. If it does not, this is a finding.
Fix: F-3754r557612_fix
Configure the operating system to store only encrypted representations of passwords.
- RMF Control
- IA-5
- Severity
- H
- CCI
- CCI-000197
- Version
- SRG-OS-000074-GPOS-00042
- Vuln IDs
-
- V-203630
- V-56699
- Rule IDs
-
- SV-203630r987796_rule
- SV-70959
Checks: C-3755r557614_chk
Verify the operating system transmits only encrypted representations of passwords. If it does not, this is a finding.
Fix: F-3755r557615_fix
Configure the operating system to transmit only encrypted representations of passwords.
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- SRG-OS-000075-GPOS-00043
- Vuln IDs
-
- V-203631
- V-56701
- Rule IDs
-
- SV-203631r982188_rule
- SV-70961
Checks: C-3756r557617_chk
Verify operating system enforces 24 hours/1 day as the minimum password lifetime. If it does not, this is a finding.
Fix: F-3756r557618_fix
Configure operating system to enforce 24 hours/1 day as the minimum password lifetime.
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- SRG-OS-000076-GPOS-00044
- Vuln IDs
-
- V-203632
- V-56703
- Rule IDs
-
- SV-203632r982200_rule
- SV-70963
Checks: C-3757r557620_chk
Verify operating system enforces a 60-day maximum password lifetime restriction. If it does not, this is a finding.
Fix: F-3757r557621_fix
Configure operating system to enforce a 60-day maximum password lifetime restriction.
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- SRG-OS-000078-GPOS-00046
- Vuln IDs
-
- V-203634
- V-56743
- Rule IDs
-
- SV-203634r982202_rule
- SV-71003
Checks: C-3759r557626_chk
Verify the operating system enforces a minimum 15-character password length. If it does not, this is a finding.
Fix: F-3759r557627_fix
Configure the operating system to enforce a minimum 15-character password length.
- RMF Control
- IA-6
- Severity
- M
- CCI
- CCI-000206
- Version
- SRG-OS-000079-GPOS-00047
- Vuln IDs
-
- V-203635
- V-56745
- Rule IDs
-
- SV-203635r958470_rule
- SV-71005
Checks: C-3760r557629_chk
Verify the operating system obscures feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals. If it does not, this is a finding.
Fix: F-3760r557630_fix
Configure the operating system to obscure feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- SRG-OS-000080-GPOS-00048
- Vuln IDs
-
- V-203636
- V-56747
- Rule IDs
-
- SV-203636r958472_rule
- SV-71007
Checks: C-3761r557632_chk
Verify the operating system enforces approved authorizations for logical access to information and system resources in accordance with applicable access control policies. If it does not, this is a finding.
Fix: F-3761r557633_fix
Configure the operating system to enforce approved authorizations for logical access to information and system resources in accordance with applicable access control policies.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- SRG-OS-000095-GPOS-00049
- Vuln IDs
-
- V-203637
- V-56749
- Rule IDs
-
- SV-203637r958478_rule
- SV-71009
Checks: C-3762r557635_chk
Verify the operating system is configured to disable non-essential capabilities. If it does not, this is a finding.
Fix: F-3762r557637_fix
Configure the operating system to disable non-essential capabilities.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000382
- Version
- SRG-OS-000096-GPOS-00050
- Vuln IDs
-
- V-203638
- V-56751
- Rule IDs
-
- SV-203638r958480_rule
- SV-71011
Checks: C-3763r557640_chk
Verify the operating system is configured to prohibit or restrict the use of functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments. If it does not, this is a finding.
Fix: F-3763r557641_fix
Configure the operating system to prohibit or restrict the use of functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000764
- Version
- SRG-OS-000104-GPOS-00051
- Vuln IDs
-
- V-203639
- V-56753
- Rule IDs
-
- SV-203639r958482_rule
- SV-71013
Checks: C-3764r557643_chk
Verify the operating system uniquely identifies and authenticates organizational users (or processes acting on behalf of organizational users). If it does not, this is a finding.
Fix: F-3764r557644_fix
Configure the operating system to uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000765
- Version
- SRG-OS-000105-GPOS-00052
- Vuln IDs
-
- V-203640
- V-56755
- Rule IDs
-
- SV-203640r958484_rule
- SV-71015
Checks: C-3765r557646_chk
Verify the operating system uses multifactor authentication for network access to privileged accounts. If it does not, this is a finding.
Fix: F-3765r557647_fix
Configure the operating system to use multifactor authentication for network access to privileged accounts.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000766
- Version
- SRG-OS-000106-GPOS-00053
- Vuln IDs
-
- V-203641
- V-56757
- Rule IDs
-
- SV-203641r958486_rule
- SV-71017
Checks: C-3766r557168_chk
Verify the operating system uses multifactor authentication for network access to non-privileged accounts. If it does not, this is a finding.
Fix: F-3766r557169_fix
Configure the operating system to use multifactor authentication for network access to non-privileged accounts.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000765
- Version
- SRG-OS-000107-GPOS-00054
- Vuln IDs
-
- V-203642
- V-56759
- Rule IDs
-
- SV-203642r982203_rule
- SV-71019
Checks: C-3767r557171_chk
Verify the operating system uses multifactor authentication for local access to privileged accounts. If it does not, this is a finding.
Fix: F-3767r557172_fix
Configure the operating system to use multifactor authentication for local access to privileged accounts.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000766
- Version
- SRG-OS-000108-GPOS-00055
- Vuln IDs
-
- V-203643
- V-56761
- Rule IDs
-
- SV-203643r982204_rule
- SV-71021
Checks: C-3768r982133_chk
Verify the operating system uses multifactor authentication for local access to nonprivileged accounts. If it does not, this is a finding.
Fix: F-3768r982134_fix
Configure the operating system to use multifactor authentication for local access to nonprivileged accounts.
- RMF Control
- Severity
- M
- CCI
- CCI-004045
- Version
- SRG-OS-000109-GPOS-00056
- Vuln IDs
-
- V-203644
- V-56763
- Rule IDs
-
- SV-203644r982205_rule
- SV-71023
Checks: C-3769r557177_chk
Verify the operating system requires individuals to be authenticated with an individual authenticator prior to using a group authenticator. If it does not, this is a finding.
Fix: F-3769r557178_fix
Configure the operating system to require individuals to be authenticated with an individual authenticator prior to using a group authenticator.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001941
- Version
- SRG-OS-000112-GPOS-00057
- Vuln IDs
-
- V-203645
- V-56765
- Rule IDs
-
- SV-203645r958494_rule
- SV-71025
Checks: C-3770r557180_chk
Verify the operating system implements replay-resistant authentication mechanisms for network access to privileged accounts. If it does not, this is a finding.
Fix: F-3770r557181_fix
Configure the operating system to implement replay-resistant authentication mechanisms for network access to privileged accounts.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001941
- Version
- SRG-OS-000113-GPOS-00058
- Vuln IDs
-
- V-203646
- V-56767
- Rule IDs
-
- SV-203646r982206_rule
- SV-71027
Checks: C-3771r982137_chk
Verify the operating system implements replay-resistant authentication mechanisms for network access to nonprivileged accounts. If it does not, this is a finding.
Fix: F-3771r982138_fix
Configure the operating system to implement replay-resistant authentication mechanisms for network access to nonprivileged accounts.
- RMF Control
- IA-3
- Severity
- M
- CCI
- CCI-000778
- Version
- SRG-OS-000114-GPOS-00059
- Vuln IDs
-
- V-203647
- V-56769
- Rule IDs
-
- SV-203647r958498_rule
- SV-71029
Checks: C-3772r557186_chk
Verify the operating system uniquely identifies peripherals before establishing a connection. If it does not, this is a finding.
Fix: F-3772r557187_fix
Configure the operating system to uniquely identify peripherals before establishing a connection.
- RMF Control
- Severity
- M
- CCI
- CCI-003627
- Version
- SRG-OS-000118-GPOS-00060
- Vuln IDs
-
- V-203648
- V-56771
- Rule IDs
-
- SV-203648r982189_rule
- SV-71031
Checks: C-3773r557189_chk
Verify the operating system disables account identifiers (individuals, groups, roles, and devices) after 35 days of inactivity. If it does not, this is a finding.
Fix: F-3773r557190_fix
Configure the operating system to disable account identifiers (individuals, groups, roles, and devices) after 35 days of inactivity.
- RMF Control
- IA-7
- Severity
- M
- CCI
- CCI-000803
- Version
- SRG-OS-000120-GPOS-00061
- Vuln IDs
-
- V-203649
- V-56785
- Rule IDs
-
- SV-203649r971535_rule
- SV-71045
Checks: C-3774r557192_chk
Verify the operating system uses mechanisms meeting the requirements of applicable federal laws, Executive orders, directives, policies, regulations, standards, and guidance for authentication to a cryptographic module. If it does not, this is a finding.
Fix: F-3774r557193_fix
Configure the operating system to use mechanisms meeting the requirements of applicable federal laws, Executive orders, directives, policies, regulations, standards, and guidance for authentication to a cryptographic module.
- RMF Control
- IA-8
- Severity
- M
- CCI
- CCI-000804
- Version
- SRG-OS-000121-GPOS-00062
- Vuln IDs
-
- V-203650
- V-56791
- Rule IDs
-
- SV-203650r958504_rule
- SV-71051
Checks: C-3775r557195_chk
Verify the operating system uniquely identifies and authenticates non-organizational users (or processes acting on behalf of non-organizational users). If it does not, this is a finding.
Fix: F-3775r557196_fix
Configure the operating system to uniquely identify and authenticate non-organizational users (or processes acting on behalf of non-organizational users).
- RMF Control
- AU-7
- Severity
- M
- CCI
- CCI-001876
- Version
- SRG-OS-000122-GPOS-00063
- Vuln IDs
-
- V-203651
- V-56799
- Rule IDs
-
- SV-203651r958506_rule
- SV-71059
Checks: C-3776r557198_chk
Verify the operating system provides an audit reduction capability that supports on-demand reporting requirements. If it does not, this is a finding.
Fix: F-3776r557199_fix
Configure the operating system to provide an audit reduction capability that supports on-demand reporting requirements.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001682
- Version
- SRG-OS-000123-GPOS-00064
- Vuln IDs
-
- V-203652
- V-56805
- Rule IDs
-
- SV-203652r958508_rule
- SV-71065
Checks: C-3777r557201_chk
Verify the operating system is configured such that emergency administrator accounts are automatically removed or disabled within 72 hours. If it is not, this is a finding.
Fix: F-3777r557202_fix
Configure the operating system such that emergency administrator accounts are automatically removed or disabled within 72 hours.
- RMF Control
- MA-4
- Severity
- H
- CCI
- CCI-000877
- Version
- SRG-OS-000125-GPOS-00065
- Vuln IDs
-
- V-203653
- V-56811
- Rule IDs
-
- SV-203653r958510_rule
- SV-71071
Checks: C-3778r557204_chk
Verify the operating system employs strong authenticators in the establishment of nonlocal maintenance and diagnostic sessions. If it does not, this is a finding.
Fix: F-3778r557205_fix
Configure the operating system to employ strong authenticators in the establishment of nonlocal maintenance and diagnostic sessions.
- RMF Control
- SC-2
- Severity
- M
- CCI
- CCI-001082
- Version
- SRG-OS-000132-GPOS-00067
- Vuln IDs
-
- V-203655
- V-56835
- Rule IDs
-
- SV-203655r958514_rule
- SV-71095
Checks: C-3780r557210_chk
Verify the operating system separates user functionality (including user interface services) from operating system management functionality. If it does not, this is a finding.
Fix: F-3780r557211_fix
Configure the operating system to separate user functionality (including user interface services) from operating system management functionality.
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- SRG-OS-000134-GPOS-00068
- Vuln IDs
-
- V-203656
- V-56843
- Rule IDs
-
- SV-203656r958518_rule
- SV-71103
Checks: C-3781r557213_chk
Verify the operating system isolates security functions from nonsecurity functions. If it does not, this is a finding.
Fix: F-3781r557214_fix
Configure the operating system to isolate security functions from nonsecurity functions.
- RMF Control
- SC-4
- Severity
- M
- CCI
- CCI-001090
- Version
- SRG-OS-000138-GPOS-00069
- Vuln IDs
-
- V-203657
- V-56853
- Rule IDs
-
- SV-203657r958524_rule
- SV-71113
Checks: C-3782r557216_chk
Verify operating systems prevents unauthorized and unintended information transfer via shared system resources. If it does not, this is a finding.
Fix: F-3782r557217_fix
Configure operating systems to prevent unauthorized and unintended information transfer via shared system resources.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-001095
- Version
- SRG-OS-000142-GPOS-00071
- Vuln IDs
-
- V-203658
- V-56861
- Rule IDs
-
- SV-203658r958528_rule
- SV-71121
Checks: C-3783r557219_chk
Verify the operating system manages excess capacity, bandwidth, or other redundancy to limit the effects of information flooding types of Denial of Service (DoS) attacks. If it does not, this is a finding.
Fix: F-3783r557220_fix
Configure the operating system to manage excess capacity, bandwidth, or other redundancy to limit the effects of information flooding types of Denial of Service (DoS) attacks.
- RMF Control
- SC-10
- Severity
- M
- CCI
- CCI-001133
- Version
- SRG-OS-000163-GPOS-00072
- Vuln IDs
-
- V-203659
- V-56865
- Rule IDs
-
- SV-203659r970703_rule
- SV-71125
Checks: C-3784r793161_chk
Verify the operating system terminates all network connections associated with a communications session at the end of the session, or as follows: for in-band management sessions (privileged sessions), the session must be terminated after 10 minutes of inactivity; and for user sessions (non-privileged session), the session must be terminated after 15 minutes of inactivity, except to fulfill documented and validated mission requirements. If it does not, this is a finding.
Fix: F-3784r793151_fix
Configure the operating system to terminate all network connections associated with a communications session at the end of the session, or as follows: for in-band management sessions (privileged sessions), the session must be terminated after 10 minutes of inactivity; and for user sessions (non-privileged session), the session must be terminated after 15 minutes of inactivity, except to fulfill documented and validated mission requirements.
- RMF Control
- SC-24
- Severity
- M
- CCI
- CCI-001190
- Version
- SRG-OS-000184-GPOS-00078
- Vuln IDs
-
- V-203660
- V-56869
- Rule IDs
-
- SV-203660r958550_rule
- SV-71129
Checks: C-3785r557225_chk
Verify the operating system fails to a secure state if system initialization fails, shutdown fails, or aborts fail. If it does not, this is a finding.
Fix: F-3785r557226_fix
Configure the operating system to fail to a secure state if system initialization fails, shutdown fails, or aborts fail.
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-001199
- Version
- SRG-OS-000185-GPOS-00079
- Vuln IDs
-
- V-203661
- V-56877
- Rule IDs
-
- SV-203661r958552_rule
- SV-71137
Checks: C-3786r557228_chk
Verify the operating system protects the confidentiality and integrity of all information at rest. If it does not, this is a finding.
Fix: F-3786r557229_fix
Configure the operating system to protect the confidentiality and integrity of all information at rest.
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- SRG-OS-000205-GPOS-00083
- Vuln IDs
-
- V-203663
- V-56887
- Rule IDs
-
- SV-203663r958564_rule
- SV-71147
Checks: C-3788r557234_chk
Verify the operating system generates error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries. If it does not, this is a finding.
Fix: F-3788r557235_fix
Configure the operating system to generate error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries.
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001314
- Version
- SRG-OS-000206-GPOS-00084
- Vuln IDs
-
- V-203664
- V-56903
- Rule IDs
-
- SV-203664r958566_rule
- SV-71163
Checks: C-3789r557237_chk
Verify the operating system reveals error messages only to authorized users. If it does not, this is a finding.
Fix: F-3789r557238_fix
Configure the operating system to reveal error messages only to authorized users.
- RMF Control
- AC-8
- Severity
- M
- CCI
- CCI-001384
- Version
- SRG-OS-000228-GPOS-00088
- Vuln IDs
-
- V-203665
- V-56909
- Rule IDs
-
- SV-203665r958586_rule
- SV-71169
Checks: C-3790r755178_chk
Verify any publically accessible connection to the operating system displays the Standard Mandatory DoD Notice and Consent Banner before granting access to the system. The banner must be formatted in accordance with applicable DoD policy. Use the following verbiage for operating systems that can accommodate banners of 1300 characters: "You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device attached to this IS), you consent to the following conditions: -The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. -At any time, the USG may inspect and seize data stored on this IS. -Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG-authorized purpose. -This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy. -Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details." Use the following verbiage for operating systems that have severe limitations on the number of characters that can be displayed in the banner: "I've read & consent to terms in IS user agreem't." If it does not, this is a finding.
Fix: F-3790r755179_fix
Configure any publically accessible connection to the operating system to display the Standard Mandatory DoD Notice and Consent Banner before granting access to the system. The banner must be formatted in accordance with applicable DoD policy. Use the following verbiage for operating systems that can accommodate banners of 1300 characters: "You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device attached to this IS), you consent to the following conditions: -The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. -At any time, the USG may inspect and seize data stored on this IS. -Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG-authorized purpose. -This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy. -Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details." Use the following verbiage for operating systems that have severe limitations on the number of characters that can be displayed in the banner: "I've read & consent to terms in IS user agreem't."
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001403
- Version
- SRG-OS-000239-GPOS-00089
- Vuln IDs
-
- V-203666
- V-56913
- Rule IDs
-
- SV-203666r991551_rule
- SV-71173
Checks: C-3791r374825_chk
Verify the operating system automatically audits account modification. If it does not, this is a finding.
Fix: F-3791r374826_fix
Configure the operating system to automatically audit account modification.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001404
- Version
- SRG-OS-000240-GPOS-00090
- Vuln IDs
-
- V-203667
- V-56917
- Rule IDs
-
- SV-203667r991552_rule
- SV-71177
Checks: C-3792r374828_chk
Verify the operating system automatically audits account disabling actions. If it does not, this is a finding.
Fix: F-3792r374829_fix
Configure the operating system to automatically audit account disabling actions.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001405
- Version
- SRG-OS-000241-GPOS-00091
- Vuln IDs
-
- V-203668
- V-56921
- Rule IDs
-
- SV-203668r991553_rule
- SV-71181
Checks: C-3793r374831_chk
Verify the operating system automatically audits account removal actions. If it does not, this is a finding.
Fix: F-3793r374832_fix
Configure the operating system to automatically audit account removal actions.
- RMF Control
- AC-17
- Severity
- H
- CCI
- CCI-001453
- Version
- SRG-OS-000250-GPOS-00093
- Vuln IDs
-
- V-203669
- V-56935
- Rule IDs
-
- SV-203669r991554_rule
- SV-71195
Checks: C-3794r374834_chk
Verify the operating system implements cryptography to protect the integrity of remote access sessions. If it does not, this is a finding.
Fix: F-3794r374835_fix
Configure the operating system to implement cryptography to protect the integrity of remote access sessions.
- RMF Control
- AU-14
- Severity
- M
- CCI
- CCI-001464
- Version
- SRG-OS-000254-GPOS-00095
- Vuln IDs
-
- V-203670
- V-56939
- Rule IDs
-
- SV-203670r991555_rule
- SV-71199
Checks: C-3795r374837_chk
Verify the operating system initiates session audits at system start-up. If it does not, this is a finding.
Fix: F-3795r374838_fix
Configure the operating system to initiate session audits at system start-up.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-001487
- Version
- SRG-OS-000255-GPOS-00096
- Vuln IDs
-
- V-203671
- V-57171
- Rule IDs
-
- SV-203671r991556_rule
- SV-71431
Checks: C-3796r374900_chk
Verify the operating system produces audit records containing information to establish the identity of any individual or process associated with the event. If it does not, this is a finding.
Fix: F-3796r374901_fix
Configure the operating system to produce audit records containing information to establish the identity of any individual or process associated with the event.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001493
- Version
- SRG-OS-000256-GPOS-00097
- Vuln IDs
-
- V-203672
- V-57173
- Rule IDs
-
- SV-203672r991557_rule
- SV-71433
Checks: C-3797r374903_chk
Verify the operating system protects audit tools from unauthorized access. If it does not, this is a finding.
Fix: F-3797r374904_fix
Configure the operating system to protect audit tools from unauthorized access.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001494
- Version
- SRG-OS-000257-GPOS-00098
- Vuln IDs
-
- V-203673
- V-57175
- Rule IDs
-
- SV-203673r991558_rule
- SV-71435
Checks: C-3798r374906_chk
Verify the operating system protects audit tools from unauthorized modification. If it does not, this is a finding.
Fix: F-3798r374907_fix
Configure the operating system to protect audit tools from unauthorized modification.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001495
- Version
- SRG-OS-000258-GPOS-00099
- Vuln IDs
-
- V-203674
- V-57177
- Rule IDs
-
- SV-203674r991559_rule
- SV-71437
Checks: C-3799r374909_chk
Verify the operating system protects audit tools from unauthorized deletion. If it does not, this is a finding.
Fix: F-3799r374910_fix
Configure the operating system to protect audit tools from unauthorized deletion.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001499
- Version
- SRG-OS-000259-GPOS-00100
- Vuln IDs
-
- V-203675
- V-57183
- Rule IDs
-
- SV-203675r991560_rule
- SV-71443
Checks: C-3800r374912_chk
Verify the operating system limits privileges to change software resident within software libraries. If it does not, this is a finding.
Fix: F-3800r374913_fix
Configure the operating system to limit privileges to change software resident within software libraries.
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- SRG-OS-000266-GPOS-00101
- Vuln IDs
-
- V-203676
- V-57187
- Rule IDs
-
- SV-203676r991561_rule
- SV-71447
Checks: C-3801r374915_chk
Verify the operating system enforces password complexity by requiring that at least one special character be used. If it does not, this is a finding.
Fix: F-3801r374916_fix
Configure the operating system to enforce password complexity by requiring that at least one special character be used.
- RMF Control
- SC-24
- Severity
- M
- CCI
- CCI-001665
- Version
- SRG-OS-000269-GPOS-00103
- Vuln IDs
-
- V-203677
- V-57191
- Rule IDs
-
- SV-203677r991562_rule
- SV-71451
Checks: C-3802r374918_chk
Verify, in the event of a system failure, the operating system preserves any information necessary to determine cause of failure and any information necessary to return to operations with least disruption to mission processes. If it does not, this is a finding.
Fix: F-3802r374919_fix
Configure the operating system to preserve any information necessary to determine cause of failure and any information necessary to return to operations with least disruption to mission processes, in the event of a system failure.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000015
- Version
- SRG-OS-000274-GPOS-00104
- Vuln IDs
-
- V-203678
- V-57195
- Rule IDs
-
- SV-203678r991563_rule
- SV-71455
Checks: C-3803r374921_chk
Verify the operating system notifies System Administrators and Information System Security Officers when accounts are created. If it does not, this is a finding.
Fix: F-3803r374922_fix
Configure the operating system to notify System Administrators and Information System Security Officers when accounts are created.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000015
- Version
- SRG-OS-000275-GPOS-00105
- Vuln IDs
-
- V-203679
- V-57197
- Rule IDs
-
- SV-203679r991564_rule
- SV-71457
Checks: C-3804r374924_chk
Verify the operating system notifies System Administrators and Information System Security Officers when accounts are modified. If it does not, this is a finding.
Fix: F-3804r374925_fix
Configure the operating system to notify System Administrators and Information System Security Officers when accounts are modified.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000015
- Version
- SRG-OS-000276-GPOS-00106
- Vuln IDs
-
- V-203680
- V-57199
- Rule IDs
-
- SV-203680r991565_rule
- SV-71459
Checks: C-3805r374927_chk
Verify the operating system notifies System Administrators and Information System Security Officers when accounts are disabled. If it does not, this is a finding.
Fix: F-3805r374928_fix
Configure the operating system to notify System Administrators and Information System Security Officers when accounts are disabled.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000015
- Version
- SRG-OS-000277-GPOS-00107
- Vuln IDs
-
- V-203681
- V-57201
- Rule IDs
-
- SV-203681r991566_rule
- SV-71461
Checks: C-3806r374930_chk
Verify the operating system notifies System Administrators and Information System Security Officers for account removal actions. If it does not, this is a finding.
Fix: F-3806r374931_fix
Configure the operating system to notify System Administrators and Information System Security Officers for account removal actions.
- RMF Control
- AU-9
- Severity
- H
- CCI
- CCI-001496
- Version
- SRG-OS-000278-GPOS-00108
- Vuln IDs
-
- V-203682
- V-57205
- Rule IDs
-
- SV-203682r991567_rule
- SV-71465
Checks: C-3807r374933_chk
Verify the operating system uses cryptographic mechanisms to protect the integrity of audit tools. If it does not, this is a finding.
Fix: F-3807r374934_fix
Configure the operating system to use cryptographic mechanisms to protect the integrity of audit tools.
- RMF Control
- AC-12
- Severity
- M
- CCI
- CCI-002361
- Version
- SRG-OS-000279-GPOS-00109
- Vuln IDs
-
- V-203683
- V-57207
- Rule IDs
-
- SV-203683r958636_rule
- SV-71467
Checks: C-3808r374936_chk
Verify the operating system automatically terminates a user session after inactivity time-outs have expired or at shutdown. If it does not, this is a finding.
Fix: F-3808r374937_fix
Configure the operating system to automatically terminate a user session after inactivity time-outs have expired or at shutdown.
- RMF Control
- AC-12
- Severity
- M
- CCI
- CCI-002363
- Version
- SRG-OS-000280-GPOS-00110
- Vuln IDs
-
- V-203684
- V-57209
- Rule IDs
-
- SV-203684r958638_rule
- SV-71469
Checks: C-3809r374939_chk
Verify the operating system provides a logoff capability for user-initiated communications sessions when requiring user access authentication. If it does not, this is a finding.
Fix: F-3809r374940_fix
Configure the operating system to provide a logoff capability for user-initiated communications sessions when requiring user access authentication.
- RMF Control
- AC-12
- Severity
- M
- CCI
- CCI-002364
- Version
- SRG-OS-000281-GPOS-00111
- Vuln IDs
-
- V-203685
- V-57211
- Rule IDs
-
- SV-203685r958640_rule
- SV-71471
Checks: C-3810r374942_chk
Verify the operating system displays an explicit logoff message to users indicating the reliable termination of authenticated communications sessions. If it does not, this is a finding.
Fix: F-3810r374943_fix
Configure the operating system to display an explicit logoff message to users indicating the reliable termination of authenticated communications sessions.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-002314
- Version
- SRG-OS-000297-GPOS-00115
- Vuln IDs
-
- V-203686
- V-57213
- Rule IDs
-
- SV-203686r958672_rule
- SV-71473
Checks: C-3811r374945_chk
Verify the operating system controls remote access methods. If it does not, this is a finding.
Fix: F-3811r374946_fix
Configure the operating system to control remote access methods.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-002322
- Version
- SRG-OS-000298-GPOS-00116
- Vuln IDs
-
- V-203687
- V-57215
- Rule IDs
-
- SV-203687r958674_rule
- SV-71475
Checks: C-3812r374948_chk
Verify the operating system provides the capability to immediately disconnect or disable remote access to the operating system. If it does not, this is a finding.
Fix: F-3812r374949_fix
Configure the operating system to provide the capability to immediately disconnect or disable remote access to the operating system.
- RMF Control
- AC-18
- Severity
- M
- CCI
- CCI-001444
- Version
- SRG-OS-000299-GPOS-00117
- Vuln IDs
-
- V-203688
- V-57217
- Rule IDs
-
- SV-203688r991568_rule
- SV-71477
Checks: C-3813r374951_chk
Verify the operating system protects wireless access to and from the system using encryption. If it does not, this is a finding.
Fix: F-3813r374952_fix
Configure the operating system to protect wireless access to and from the system using encryption.
- RMF Control
- AC-18
- Severity
- M
- CCI
- CCI-001443
- Version
- SRG-OS-000300-GPOS-00118
- Vuln IDs
-
- V-203689
- V-57219
- Rule IDs
-
- SV-203689r991569_rule
- SV-71479
Checks: C-3814r374954_chk
Verify the operating system protects wireless access to the system using authentication of users and/or devices. If it does not, this is a finding.
Fix: F-3814r374955_fix
Configure the operating system to protect wireless access to the system using authentication of users and/or devices.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-002130
- Version
- SRG-OS-000303-GPOS-00120
- Vuln IDs
-
- V-203690
- V-57221
- Rule IDs
-
- SV-203690r958684_rule
- SV-71481
Checks: C-3815r374957_chk
Verify the operating system automatically audits account enabling actions. If it does not, this is a finding.
Fix: F-3815r374958_fix
Configure the operating system to automatically audit account enabling actions.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000015
- Version
- SRG-OS-000304-GPOS-00121
- Vuln IDs
-
- V-203691
- V-57223
- Rule IDs
-
- SV-203691r982207_rule
- SV-71483
Checks: C-3816r982140_chk
Verify the operating system notifies the SA(s) and ISSO(s) when accounts are created, or enabled when previously disabled. If it does not, this is a finding.
Fix: F-3816r982141_fix
Configure the operating system to notify the SA(s) and ISSO(s) when accounts are created, or enabled when previously disabled.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002165
- Version
- SRG-OS-000312-GPOS-00122
- Vuln IDs
-
- V-203692
- V-57225
- Rule IDs
-
- SV-203692r958702_rule
- SV-71485
Checks: C-3817r375023_chk
Verify the operating system allows operating system admins to pass information to any other operating system admin or user. If it does not, this is a finding.
Fix: F-3817r375024_fix
Configure the operating system to allow operating system admins to pass information to any other operating system admin or user.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002165
- Version
- SRG-OS-000312-GPOS-00123
- Vuln IDs
-
- V-203693
- V-57227
- Rule IDs
-
- SV-203693r958702_rule
- SV-71487
Checks: C-3818r375026_chk
Verify the operating system allows operating system admins to grant their privileges to other operating system admins. If it does not, this is a finding.
Fix: F-3818r375027_fix
Configure the operating system to allow operating system admins to grant their privileges to other operating system admins.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002165
- Version
- SRG-OS-000312-GPOS-00124
- Vuln IDs
-
- V-203694
- V-57229
- Rule IDs
-
- SV-203694r958702_rule
- SV-71489
Checks: C-3819r375029_chk
Verify the operating system allows operating system admins to change security attributes on users, the operating system, or the operating system's components. If it does not, this is a finding.
Fix: F-3819r375030_fix
Configure the operating system to allow operating system admins to change security attributes on users, the operating system, or the operating system's components.
- RMF Control
- AC-6
- Severity
- H
- CCI
- CCI-002235
- Version
- SRG-OS-000324-GPOS-00125
- Vuln IDs
-
- V-203695
- V-57231
- Rule IDs
-
- SV-203695r958726_rule
- SV-71491
Checks: C-3820r375032_chk
Verify that the operating system prevents non-privileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures. If it does not, this is a finding.
Fix: F-3820r375033_fix
Configure the operating system to prevent non-privileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures.
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002233
- Version
- SRG-OS-000326-GPOS-00126
- Vuln IDs
-
- V-203696
- V-57233
- Rule IDs
-
- SV-203696r958730_rule
- SV-71493
Checks: C-3821r375035_chk
Verify that the operating system prevents all software from executing at higher privilege levels than users executing the software. If it does not, this is a finding.
Fix: F-3821r375036_fix
Configure the operating system to prevent all software from executing at higher privilege levels than users executing the software.
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002234
- Version
- SRG-OS-000327-GPOS-00127
- Vuln IDs
-
- V-203697
- V-57235
- Rule IDs
-
- SV-203697r958732_rule
- SV-71495
Checks: C-3822r375038_chk
Verify that the operating system audits the execution of privileged functions. If it does not, this is a finding.
Fix: F-3822r375039_fix
Configure the operating system to audit the execution of privileged functions.
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-002238
- Version
- SRG-OS-000329-GPOS-00128
- Vuln IDs
-
- V-203698
- V-57237
- Rule IDs
-
- SV-203698r958736_rule
- SV-71497
Checks: C-3823r375041_chk
Verify the operating system automatically locks an account until the locked account is released by an administrator when three unsuccessful logon attempts in 15 minutes are made. If it does not, this is a finding.
Fix: F-3823r375042_fix
Configure the operating system to automatically lock an account until the locked account is released by an administrator when three unsuccessful logon attempts in 15 minutes are made.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-001914
- Version
- SRG-OS-000337-GPOS-00129
- Vuln IDs
-
- V-203699
- V-57239
- Rule IDs
-
- SV-203699r971541_rule
- SV-71499
Checks: C-3824r877019_chk
Verify the operating system provides the capability for assigned IMOs/ISSOs or designated SAs to change the auditing to be performed on all operating system components, based on all selectable event criteria in near real time. If it does not, this is a finding.
Fix: F-3824r375045_fix
Configure the operating system to provide the capability for assigned IMOs/ISSOs or designated SAs to change the auditing to be performed on all operating system components, based on all selectable event criteria in near real time.
- RMF Control
- AU-4
- Severity
- L
- CCI
- CCI-001849
- Version
- SRG-OS-000341-GPOS-00132
- Vuln IDs
-
- V-203700
- V-57245
- Rule IDs
-
- SV-203700r958752_rule
- SV-71505
Checks: C-3825r375047_chk
Verify the operating system allocates audit record storage capacity to store at least one week's worth of audit records, when audit records are not immediately sent to a central audit record storage facility. If it does not, this is a finding.
Fix: F-3825r375048_fix
Configure the operating system to allocate audit record storage capacity to store at least one week's worth of audit records, when audit records are not immediately sent to a central audit record storage facility.
- RMF Control
- AU-4
- Severity
- L
- CCI
- CCI-001851
- Version
- SRG-OS-000342-GPOS-00133
- Vuln IDs
-
- V-203701
- V-57247
- Rule IDs
-
- SV-203701r958754_rule
- SV-71507
Checks: C-3826r375050_chk
Verify the operating system off-loads audit records onto a different system or media from the system being audited. If it does not, this is a finding.
Fix: F-3826r375051_fix
Configure the operating system to off-load audit records onto a different system or media from the system being audited.
- RMF Control
- AU-5
- Severity
- L
- CCI
- CCI-001855
- Version
- SRG-OS-000343-GPOS-00134
- Vuln IDs
-
- V-203702
- V-57249
- Rule IDs
-
- SV-203702r971542_rule
- SV-71509
Checks: C-3827r375053_chk
Verify the operating system immediately notifies the SA and ISSO (at a minimum) when allocated audit record storage volume reaches 75% of the repository maximum audit record storage capacity. If it does not, this is a finding.
Fix: F-3827r375054_fix
Configure the operating system to immediately notify the SA and ISSO (at a minimum) when allocated audit record storage volume reaches 75% of the repository maximum audit record storage capacity.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-001858
- Version
- SRG-OS-000344-GPOS-00135
- Vuln IDs
-
- V-203703
- V-57251
- Rule IDs
-
- SV-203703r958758_rule
- SV-71511
Checks: C-3828r375056_chk
Verify the operating system provides an immediate real-time alert to the SA and ISSO, at a minimum, of all audit failure events requiring real-time alerts. If it does not, this is a finding.
Fix: F-3828r375057_fix
Configure the operating system to provide an immediate real-time alert to the SA and ISSO, at a minimum, of all audit failure events requiring real-time alerts.
- RMF Control
- AU-7
- Severity
- L
- CCI
- CCI-001875
- Version
- SRG-OS-000348-GPOS-00136
- Vuln IDs
-
- V-203704
- V-57253
- Rule IDs
-
- SV-203704r958766_rule
- SV-71513
Checks: C-3829r375059_chk
Verify the operating system provides an audit reduction capability that supports on-demand audit review and analysis. If it does not, this is a finding.
Fix: F-3829r375060_fix
Configure the operating system to provide an audit reduction capability that supports on-demand audit review and analysis.
- RMF Control
- AU-7
- Severity
- L
- CCI
- CCI-001877
- Version
- SRG-OS-000349-GPOS-00137
- Vuln IDs
-
- V-203705
- V-57255
- Rule IDs
-
- SV-203705r958768_rule
- SV-71515
Checks: C-3830r375062_chk
Verify the operating system provides an audit reduction capability that supports after-the-fact investigations of security incidents. If it does not, this is a finding.
Fix: F-3830r375063_fix
Configure the operating system to provide an audit reduction capability that supports after-the-fact investigations of security incidents.
- RMF Control
- AU-7
- Severity
- L
- CCI
- CCI-001878
- Version
- SRG-OS-000350-GPOS-00138
- Vuln IDs
-
- V-203706
- V-57257
- Rule IDs
-
- SV-203706r958770_rule
- SV-71517
Checks: C-3831r375065_chk
Verify the operating system provides a report generation capability that supports on-demand audit review and analysis. If it does not, this is a finding.
Fix: F-3831r375066_fix
Configure the operating system to provide a report generation capability that supports on-demand audit review and analysis.
- RMF Control
- AU-7
- Severity
- L
- CCI
- CCI-001879
- Version
- SRG-OS-000351-GPOS-00139
- Vuln IDs
-
- V-203707
- V-57259
- Rule IDs
-
- SV-203707r958772_rule
- SV-71519
Checks: C-3832r375068_chk
Verify the operating system provides a report generation capability that supports on-demand reporting requirements. If it does not, this is a finding.
Fix: F-3832r375069_fix
Ensure the operating system provides a report generation capability that supports on-demand reporting requirements.
- RMF Control
- AU-7
- Severity
- L
- CCI
- CCI-001880
- Version
- SRG-OS-000352-GPOS-00140
- Vuln IDs
-
- V-203708
- V-57261
- Rule IDs
-
- SV-203708r958774_rule
- SV-71521
Checks: C-3833r375071_chk
Verify the operating system provides a report generation capability that supports after-the-fact investigations of security incidents. If it does not, this is a finding.
Fix: F-3833r375072_fix
Ensure the operating system provides a report generation capability that supports after-the-fact investigations of security incidents.
- RMF Control
- AU-7
- Severity
- M
- CCI
- CCI-001881
- Version
- SRG-OS-000353-GPOS-00141
- Vuln IDs
-
- V-203709
- V-57263
- Rule IDs
-
- SV-203709r958776_rule
- SV-71523
Checks: C-3834r375074_chk
Verify the operating system does not alter original content or time ordering of audit records when it provides an audit reduction capability. If it does not, this is a finding.
Fix: F-3834r375075_fix
Configure the operating system to not alter original content or time ordering of audit records when it provides an audit reduction capability.
- RMF Control
- AU-7
- Severity
- M
- CCI
- CCI-001882
- Version
- SRG-OS-000354-GPOS-00142
- Vuln IDs
-
- V-203710
- V-57265
- Rule IDs
-
- SV-203710r987795_rule
- SV-71525
Checks: C-3835r375077_chk
Verify the operating system does not alter original content or time ordering of audit records when it provides a report generation capability. If it does not, this is a finding.
Fix: F-3835r375078_fix
Configure the operating system to not alter original content or time ordering of audit records when it provides a report generation capability.
- RMF Control
- Severity
- M
- CCI
- CCI-004923
- Version
- SRG-OS-000355-GPOS-00143
- Vuln IDs
-
- V-203711
- V-57267
- Rule IDs
-
- SV-203711r982208_rule
- SV-71527
Checks: C-3836r982143_chk
Verify the operating system, for networked systems, compares internal information system clocks at least every 24 hours with a serve synchronized to one of the redundant United States Naval Observatory (USNO) time servers, or a time server designated for the appropriate DOD network (NIPRNet/SIPRNet), and/or the Global Positioning System (GPS). If it does not, this is a finding.
Fix: F-3836r982144_fix
Configure the operating system to, for networked systems, compare internal information system clocks at least every 24 hours with a server synchronized to one of the redundant United States Naval Observatory (USNO) time servers, or a time server designated for the appropriate DOD network (NIPRNet/SIPRNet), and/or the Global Positioning System (GPS).
- RMF Control
- Severity
- M
- CCI
- CCI-004926
- Version
- SRG-OS-000356-GPOS-00144
- Vuln IDs
-
- V-203712
- V-57203
- Rule IDs
-
- SV-203712r982209_rule
- SV-71463
Checks: C-3837r375143_chk
Verify the operating system synchronizes internal information system clocks to the authoritative time source when the time difference is greater than one second. If it does not, this is a finding.
Fix: F-3837r375144_fix
Configure the operating system to synchronize internal information system clocks to the authoritative time source when the time difference is greater than the organization-defined time period.
- RMF Control
- AU-8
- Severity
- M
- CCI
- CCI-001889
- Version
- SRG-OS-000358-GPOS-00145
- Vuln IDs
-
- V-203713
- V-57193
- Rule IDs
-
- SV-203713r958786_rule
- SV-71453
Checks: C-3838r375146_chk
Verify the operating system records time stamps for audit records that meet a minimum granularity of one second for a minimum degree of precision. If it does not, this is a finding.
Fix: F-3838r375147_fix
Configure the operating system to record time stamps for audit records that meet a minimum granularity of one second for a minimum degree of precision.
- RMF Control
- AU-8
- Severity
- L
- CCI
- CCI-001890
- Version
- SRG-OS-000359-GPOS-00146
- Vuln IDs
-
- V-203714
- V-57189
- Rule IDs
-
- SV-203714r958788_rule
- SV-71449
Checks: C-3839r375149_chk
Verify the operating system records time stamps for audit records that can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT). If it does not, this is a finding.
Fix: F-3839r375150_fix
Configure the operating system to record time stamps for audit records that can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT).
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-OS-000360-GPOS-00147
- Vuln IDs
-
- V-203715
- V-57185
- Rule IDs
-
- SV-203715r958790_rule
- SV-71445
Checks: C-3840r375152_chk
Verify the operating system enforces dual authorization for movement and/or deletion of all audit information, when such movement or deletion is not part of an authorized automatic process. If it does not, this is a finding.
Fix: F-3840r375153_fix
Configure the operating system to enforce dual authorization for movement and/or deletion of all audit information, when such movement or deletion is not part of an authorized automatic process.
- RMF Control
- Severity
- M
- CCI
- CCI-003980
- Version
- SRG-OS-000362-GPOS-00149
- Vuln IDs
-
- V-203716
- V-57181
- Rule IDs
-
- SV-203716r982210_rule
- SV-71441
Checks: C-3841r375155_chk
Verify the operating system prohibits user installation of system software without explicit privileged status. If it does not, this is a finding.
Fix: F-3841r375156_fix
Configure the operating system to prohibit user installation of system software without explicit privileged status.
- RMF Control
- CM-3
- Severity
- M
- CCI
- CCI-001744
- Version
- SRG-OS-000363-GPOS-00150
- Vuln IDs
-
- V-203717
- V-57179
- Rule IDs
-
- SV-203717r958794_rule
- SV-71439
Checks: C-3842r375158_chk
Verify the operating system notifies designated personnel if baseline configurations are changed in an unauthorized manner. If it does not, this is a finding.
Fix: F-3842r375159_fix
Configure the operating system to notify designated personnel if baseline configurations are changed in an unauthorized manner.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001813
- Version
- SRG-OS-000364-GPOS-00151
- Vuln IDs
-
- V-203718
- V-57169
- Rule IDs
-
- SV-203718r958796_rule
- SV-71429
Checks: C-3843r375161_chk
Verify the operating system enforces access restrictions. If it does not, this is a finding.
Fix: F-3843r375162_fix
Configure the operating system to enforce access restrictions.
- RMF Control
- Severity
- M
- CCI
- CCI-003938
- Version
- SRG-OS-000365-GPOS-00152
- Vuln IDs
-
- V-203719
- V-56851
- Rule IDs
-
- SV-203719r982211_rule
- SV-71111
Checks: C-3844r375164_chk
Verify the operating system audits the enforcement actions used to restrict access associated with changes to the system. If it does not, this is a finding.
Fix: F-3844r375165_fix
Configure the operating system to audit the enforcement actions used to restrict access associated with changes to the system.
- RMF Control
- Severity
- H
- CCI
- CCI-003992
- Version
- SRG-OS-000366-GPOS-00153
- Vuln IDs
-
- V-203720
- V-56849
- Rule IDs
-
- SV-203720r982212_rule
- SV-71109
Checks: C-3845r877024_chk
Verify the operating system prevents the installation of patches, service packs, device drivers, or operating system components without verification they have been digitally signed using a certificate that is recognized and approved by the organization. If it does not, this is a finding.
Fix: F-3845r982149_fix
Configure the operating system to prevent the installation of patches, service packs, device drivers, or operating system components without verification they have been digitally signed using a certificate recognized and approved by the organization.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001764
- Version
- SRG-OS-000368-GPOS-00154
- Vuln IDs
-
- V-203721
- V-56845
- Rule IDs
-
- SV-203721r958804_rule
- SV-71105
Checks: C-3846r375170_chk
Verify the operating system prevents program execution in accordance with local policies regarding software program usage and restrictions and/or rules authorizing the terms and conditions of software program usage. If it does not, this is a finding.
Fix: F-3846r375171_fix
Configure the operating system to prevent program execution in accordance with local policies regarding software program usage and restrictions and/or rules authorizing the terms and conditions of software program usage.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001774
- Version
- SRG-OS-000370-GPOS-00155
- Vuln IDs
-
- V-203722
- V-56841
- Rule IDs
-
- SV-203722r958808_rule
- SV-71101
Checks: C-3847r375173_chk
Verify the operating system employs a deny-all, permit-by-exception policy to allow the execution of authorized software programs. If it does not, this is a finding.
Fix: F-3847r375174_fix
Configure the operating system to employ a deny-all, permit-by-exception policy to allow the execution of authorized software programs.
- RMF Control
- Severity
- M
- CCI
- CCI-004046
- Version
- SRG-OS-000375-GPOS-00160
- Vuln IDs
-
- V-203727
- V-56817
- Rule IDs
-
- SV-203727r982216_rule
- SV-71077
Checks: C-3852r375188_chk
Verify the operating system implements multifactor authentication for remote access to privileged accounts in such a way that one of the factors is provided by a device separate from the system gaining access. If it does not, this is a finding.
Fix: F-3852r375189_fix
Configure the operating system to implement multifactor authentication for remote access to privileged accounts in such a way that one of the factors is provided by a device separate from the system gaining access.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001953
- Version
- SRG-OS-000376-GPOS-00161
- Vuln IDs
-
- V-203728
- V-56815
- Rule IDs
-
- SV-203728r958816_rule
- SV-71075
Checks: C-3853r375191_chk
Verify the operating system accepts Personal Identity Verification (PIV) credentials. If it does not, this is a finding.
Fix: F-3853r375192_fix
Configure the operating system to accept Personal Identity Verification (PIV) credentials.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001954
- Version
- SRG-OS-000377-GPOS-00162
- Vuln IDs
-
- V-203729
- V-56813
- Rule IDs
-
- SV-203729r958818_rule
- SV-71073
Checks: C-3854r375194_chk
Verify the operating system electronically verifies Personal Identity Verification (PIV) credentials. If it does not, this is a finding.
Fix: F-3854r375195_fix
Configure the operating system to electronically verify Personal Identity Verification (PIV) credentials.
- RMF Control
- IA-3
- Severity
- M
- CCI
- CCI-001958
- Version
- SRG-OS-000378-GPOS-00163
- Vuln IDs
-
- V-203730
- V-56809
- Rule IDs
-
- SV-203730r958820_rule
- SV-71069
Checks: C-3855r375197_chk
Verify the operating system authenticates peripherals before establishing a connection. If it does not, this is a finding.
Fix: F-3855r375198_fix
Configure the operating system to authenticate peripherals before establishing a connection.
- RMF Control
- IA-3
- Severity
- M
- CCI
- CCI-001967
- Version
- SRG-OS-000379-GPOS-00164
- Vuln IDs
-
- V-203731
- V-56807
- Rule IDs
-
- SV-203731r971545_rule
- SV-71067
Checks: C-3856r375257_chk
Verify the operating system authenticates all endpoint devices before establishing a local, remote, and/or network connection using bidirectional authentication that is cryptographically based. If it does not, this is a finding.
Fix: F-3856r375258_fix
Configure the operating system to authenticate all endpoint devices before establishing a local, remote, and/or network connection using bidirectional authentication that is cryptographically based.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-002007
- Version
- SRG-OS-000383-GPOS-00166
- Vuln IDs
-
- V-203733
- V-56801
- Rule IDs
-
- SV-203733r958828_rule
- SV-71061
Checks: C-3858r375263_chk
Verify the operating system prohibits the use of cached authenticators after one day. If it does not, this is a finding.
Fix: F-3858r375264_fix
Configure the operating system to prohibit the use of cached authenticators after one day.
- RMF Control
- Severity
- M
- CCI
- CCI-004068
- Version
- SRG-OS-000384-GPOS-00167
- Vuln IDs
-
- V-203734
- V-56797
- Rule IDs
-
- SV-203734r982217_rule
- SV-71057
Checks: C-3859r375266_chk
Verify the operating system, for PKI-based authentication, implements a local cache of revocation data to support path discovery and validation in case of the inability to access revocation information via the network. If it does not, this is a finding.
Fix: F-3859r375267_fix
Configure the operating system, for PKI-based authentication, to implement a local cache of revocation data to support path discovery and validation in case of the inability to access revocation information via the network.
- RMF Control
- MA-4
- Severity
- M
- CCI
- CCI-002884
- Version
- SRG-OS-000392-GPOS-00172
- Vuln IDs
-
- V-203735
- V-56795
- Rule IDs
-
- SV-203735r958846_rule
- SV-71055
Checks: C-3860r375269_chk
Verify the operating system audits all activities performed during nonlocal maintenance and diagnostic sessions. If it does not, this is a finding.
Fix: F-3860r375270_fix
Configure the operating system to audit all activities performed during nonlocal maintenance and diagnostic sessions.
- RMF Control
- MA-4
- Severity
- H
- CCI
- CCI-002890
- Version
- SRG-OS-000393-GPOS-00173
- Vuln IDs
-
- V-203736
- V-56793
- Rule IDs
-
- SV-203736r958848_rule
- SV-71053
Checks: C-3861r375272_chk
Verify the operating system implements cryptographic mechanisms to protect the integrity of nonlocal maintenance and diagnostic communications, when used for nonlocal maintenance sessions. If it does not, this is a finding.
Fix: F-3861r375273_fix
Configure the operating system to implement cryptographic mechanisms to protect the integrity of nonlocal maintenance and diagnostic communications, when used for nonlocal maintenance sessions.
- RMF Control
- MA-4
- Severity
- H
- CCI
- CCI-003123
- Version
- SRG-OS-000394-GPOS-00174
- Vuln IDs
-
- V-203737
- V-56789
- Rule IDs
-
- SV-203737r958850_rule
- SV-71049
Checks: C-3862r375275_chk
Verify the operating system implements cryptographic mechanisms to protect the confidentiality of nonlocal maintenance and diagnostic communications, when used for nonlocal maintenance sessions. If it does not, this is a finding.
Fix: F-3862r375276_fix
Configure the operating system to implement cryptographic mechanisms to protect the confidentiality of nonlocal maintenance and diagnostic communications, when used for nonlocal maintenance sessions.
- RMF Control
- MA-4
- Severity
- M
- CCI
- CCI-002891
- Version
- SRG-OS-000395-GPOS-00175
- Vuln IDs
-
- V-203738
- V-56787
- Rule IDs
-
- SV-203738r958852_rule
- SV-71047
Checks: C-3863r375278_chk
Verify the operating system verifies remote disconnection at the termination of nonlocal maintenance and diagnostic sessions, when used for nonlocal maintenance sessions. If it does not, this is a finding.
Fix: F-3863r375279_fix
Configure the operating system to verify remote disconnection at the termination of nonlocal maintenance and diagnostic sessions, when used for nonlocal maintenance sessions.
- RMF Control
- SC-13
- Severity
- H
- CCI
- CCI-002450
- Version
- SRG-OS-000396-GPOS-00176
- Vuln IDs
-
- V-203739
- V-56783
- Rule IDs
-
- SV-203739r987791_rule
- SV-71043
Checks: C-3864r375281_chk
Verify the operating system implements NSA-approved cryptography to protect classified information in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards. If it does not, this is a finding.
Fix: F-3864r375282_fix
Configure the operating system to implement NSA-approved cryptography to protect classified information in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-002470
- Version
- SRG-OS-000403-GPOS-00182
- Vuln IDs
-
- V-203744
- V-56773
- Rule IDs
-
- SV-203744r958868_rule
- SV-71033
Checks: C-3869r375296_chk
Verify the operating system only allows the use of DoD PKI-established certificate authorities for verification of the establishment of protected sessions. If it does not, this is a finding.
Fix: F-3869r375297_fix
Configure the operating system to only allow the use of DoD PKI-established certificate authorities for verification of the establishment of protected sessions.
- RMF Control
- SC-28
- Severity
- H
- CCI
- CCI-002475
- Version
- SRG-OS-000404-GPOS-00183
- Vuln IDs
-
- V-203745
- V-56741
- Rule IDs
-
- SV-203745r958870_rule
- SV-71001
Checks: C-3870r375299_chk
Verify the operating system implements cryptographic mechanisms to prevent unauthorized modification of all information at rest on all operating system components. If it does not, this is a finding.
Fix: F-3870r375300_fix
Configure the operating system to implement cryptographic mechanisms to prevent unauthorized modification of all information at rest on all operating system components.
- RMF Control
- SC-28
- Severity
- H
- CCI
- CCI-002476
- Version
- SRG-OS-000405-GPOS-00184
- Vuln IDs
-
- V-203746
- V-56739
- Rule IDs
-
- SV-203746r958872_rule
- SV-70999
Checks: C-3871r375302_chk
Verify the operating system implements cryptographic mechanisms to prevent unauthorized disclosure of all information at rest on all operating system components. If it does not, this is a finding.
Fix: F-3871r375303_fix
Configure the operating system to implement cryptographic mechanisms to prevent unauthorized disclosure of all information at rest on all operating system components.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- SRG-OS-000420-GPOS-00186
- Vuln IDs
-
- V-203747
- V-56737
- Rule IDs
-
- SV-203747r958902_rule
- SV-70997
Checks: C-3872r375305_chk
Verify the operating system protects against or limits the effects of Denial of Service (DoS) attacks by ensuring the operating system is implementing rate-limiting measures on impacted network interfaces. If it does not, this is a finding.
Fix: F-3872r375306_fix
Configure the operating system to protect against or limit the effects of Denial of Service (DoS) attacks by ensuring the operating system is implementing rate-limiting measures on impacted network interfaces.
- RMF Control
- SC-8
- Severity
- H
- CCI
- CCI-002418
- Version
- SRG-OS-000423-GPOS-00187
- Vuln IDs
-
- V-203748
- V-56735
- Rule IDs
-
- SV-203748r958908_rule
- SV-70995
Checks: C-3873r375308_chk
Verify the operating system protects the confidentiality and integrity of transmitted information. If it does not, this is a finding.
Fix: F-3873r375309_fix
Configure the operating system to protect the confidentiality and integrity of transmitted information.
- RMF Control
- SC-8
- Severity
- H
- CCI
- CCI-002421
- Version
- SRG-OS-000424-GPOS-00188
- Vuln IDs
-
- V-203749
- V-56733
- Rule IDs
-
- SV-203749r971547_rule
- SV-70993
Checks: C-3874r877464_chk
Verify the operating system implements cryptographic mechanisms to prevent unauthorized disclosure of information and/or detect changes to information during transmission unless otherwise protected by alternative physical safeguards, such as, at a minimum, a Protected Distribution System (PDS). If it does not, this is a finding.
Fix: F-3874r877029_fix
Configure the operating system to implement cryptographic mechanisms to prevent unauthorized disclosure of information and/or detect changes to information during transmission unless otherwise protected by alternative physical safeguards, such as, at a minimum, a Protected Distribution System (PDS).
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002420
- Version
- SRG-OS-000425-GPOS-00189
- Vuln IDs
-
- V-203750
- V-56731
- Rule IDs
-
- SV-203750r958912_rule
- SV-70991
Checks: C-3875r375749_chk
Verify the operating system maintains the confidentiality and integrity of information during preparation for transmission. If it does not, this is a finding.
Fix: F-3875r375750_fix
Configure the operating system to maintain the confidentiality and integrity of information during preparation for transmission.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002422
- Version
- SRG-OS-000426-GPOS-00190
- Vuln IDs
-
- V-203751
- V-56729
- Rule IDs
-
- SV-203751r958914_rule
- SV-70989
Checks: C-3876r375374_chk
Verify the operating system maintains the confidentiality and integrity of information during reception. If it does not, this is a finding.
Fix: F-3876r375375_fix
Configure the operating system to maintain the confidentiality and integrity of information during reception.
- RMF Control
- SI-10
- Severity
- M
- CCI
- CCI-002754
- Version
- SRG-OS-000432-GPOS-00191
- Vuln IDs
-
- V-203752
- V-56727
- Rule IDs
-
- SV-203752r958926_rule
- SV-70987
Checks: C-3877r375377_chk
Verify the operating system behaves in a predictable and documented manner that reflects organizational and system objectives when invalid inputs are received. If it does not, this is a finding.
Fix: F-3877r375378_fix
Configure the operating system to behave in a predictable and documented manner that reflects organizational and system objectives when invalid inputs are received.
- RMF Control
- SI-16
- Severity
- M
- CCI
- CCI-002824
- Version
- SRG-OS-000433-GPOS-00192
- Vuln IDs
-
- V-203753
- V-56725
- Rule IDs
-
- SV-203753r958928_rule
- SV-70985
Checks: C-3878r375380_chk
Verify the operating system implements non-executable data to protect its memory from unauthorized code execution. If it does not, this is a finding.
Fix: F-3878r375381_fix
Configure the operating system to implement non-executable data to protect its memory from unauthorized code execution.
- RMF Control
- SI-16
- Severity
- M
- CCI
- CCI-002824
- Version
- SRG-OS-000433-GPOS-00193
- Vuln IDs
-
- V-203754
- V-56723
- Rule IDs
-
- SV-203754r958928_rule
- SV-70983
Checks: C-3879r375383_chk
Verify the operating system implements address space layout randomization to protect its memory from unauthorized code execution. If it does not, this is a finding.
Fix: F-3879r375384_fix
Configure the operating system to implement address space layout randomization to protect its memory from unauthorized code execution.
- RMF Control
- SI-2
- Severity
- M
- CCI
- CCI-002617
- Version
- SRG-OS-000437-GPOS-00194
- Vuln IDs
-
- V-203755
- V-56721
- Rule IDs
-
- SV-203755r958936_rule
- SV-70981
Checks: C-3880r375386_chk
Verify the operating system removes all software components after updated versions have been installed. If it does not, this is a finding.
Fix: F-3880r375387_fix
Configure the operating system to remove all software components after updated versions have been installed.
- RMF Control
- SI-6
- Severity
- M
- CCI
- CCI-002696
- Version
- SRG-OS-000445-GPOS-00199
- Vuln IDs
-
- V-203756
- V-56719
- Rule IDs
-
- SV-203756r958944_rule
- SV-70979
Checks: C-3881r375389_chk
Verify the operating system verifies correct operation of all security functions. If it does not, this is a finding.
Fix: F-3881r375390_fix
Configure the operating system to verify correct operation of all security functions.
- RMF Control
- SI-6
- Severity
- M
- CCI
- CCI-002699
- Version
- SRG-OS-000446-GPOS-00200
- Vuln IDs
-
- V-203757
- V-56717
- Rule IDs
-
- SV-203757r958946_rule
- SV-70977
Checks: C-3882r375392_chk
Verify the operating system performs verification of the correct operation of security functions: upon system start-up and/or restart; upon command by a user with privileged access; and/or every 30 days. If it does not, this is a finding.
Fix: F-3882r375393_fix
Configure the operating system to perform verification of the correct operation of security functions: upon system start-up and/or restart; upon command by a user with privileged access; and/or every 30 days.
- RMF Control
- SI-6
- Severity
- M
- CCI
- CCI-002702
- Version
- SRG-OS-000447-GPOS-00201
- Vuln IDs
-
- V-203758
- V-56715
- Rule IDs
-
- SV-203758r958948_rule
- SV-70975
Checks: C-3883r375395_chk
Verify the operating system shuts down the information system, restarts the information system, and/or notifies the system administrator when anomalies in the operation of any security functions are discovered. If it does not, this is a finding.
Fix: F-3883r375396_fix
Configure the operating system to shut down the information system, restart the information system, and/or notify the system administrator when anomalies in the operation of the security functions are discovered.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-OS-000458-GPOS-00203
- Vuln IDs
-
- V-203759
- V-56713
- Rule IDs
-
- SV-203759r991570_rule
- SV-70973
Checks: C-3884r375398_chk
Verify the operating system generates audit records when successful/unsuccessful attempts to access security objects occur. If it does not, this is a finding.
Fix: F-3884r375399_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to access security objects occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-OS-000461-GPOS-00205
- Vuln IDs
-
- V-203760
- V-56711
- Rule IDs
-
- SV-203760r991571_rule
- SV-70971
Checks: C-3885r375401_chk
Verify the operating system generates audit records when successful/unsuccessful attempts to access categories of information (e.g., classification levels) occur. If it does not, this is a finding.
Fix: F-3885r375402_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to access categories of information (e.g., classification levels) occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-OS-000462-GPOS-00206
- Vuln IDs
-
- V-203761
- V-56645
- Rule IDs
-
- SV-203761r991572_rule
- SV-70905
Checks: C-3886r375404_chk
Verify the operating system generates audit records when successful/unsuccessful attempts to modify privileges occur. If it does not, this is a finding.
Fix: F-3886r375405_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to modify privileges occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-OS-000463-GPOS-00207
- Vuln IDs
-
- V-203762
- V-56643
- Rule IDs
-
- SV-203762r991573_rule
- SV-70903
Checks: C-3887r375407_chk
Verify the operating system generates audit records when successful/unsuccessful attempts to modify security objects occur. If it does not, this is a finding.
Fix: F-3887r375408_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to modify security objects occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-OS-000465-GPOS-00209
- Vuln IDs
-
- V-203763
- V-56627
- Rule IDs
-
- SV-203763r991574_rule
- SV-70887
Checks: C-3888r375410_chk
Verify the operating system generates audit records when successful/unsuccessful attempts to modify categories of information (e.g., classification levels) occur. If it does not, this is a finding.
Fix: F-3888r375411_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to modify categories of information (e.g., classification levels) occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-OS-000466-GPOS-00210
- Vuln IDs
-
- V-203764
- V-56625
- Rule IDs
-
- SV-203764r991575_rule
- SV-70885
Checks: C-3889r375413_chk
Verify the operating system generates audit records when successful/unsuccessful attempts to delete privileges occur. If it does not, this is a finding.
Fix: F-3889r375414_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to delete privileges occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-OS-000467-GPOS-00211
- Vuln IDs
-
- V-203765
- V-56623
- Rule IDs
-
- SV-203765r991576_rule
- SV-70883
Checks: C-3890r375416_chk
Verify the operating system generates audit records when successful/unsuccessful attempts to delete security levels occur. If it does not, this is a finding.
Fix: F-3890r375417_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to delete security levels occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-OS-000468-GPOS-00212
- Vuln IDs
-
- V-203766
- V-56621
- Rule IDs
-
- SV-203766r991577_rule
- SV-70881
Checks: C-3891r375419_chk
Verify the operating system generates audit records when successful/unsuccessful attempts to delete security objects occur. If it does not, this is a finding.
Fix: F-3891r375420_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to delete security objects occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-OS-000470-GPOS-00214
- Vuln IDs
-
- V-203767
- V-56619
- Rule IDs
-
- SV-203767r991578_rule
- SV-70879
Checks: C-3892r375422_chk
Verify the operating system generates audit records when successful/unsuccessful logon attempts occur. If it does not, this is a finding.
Fix: F-3892r375423_fix
Configure the operating system to generate audit records when successful/unsuccessful logon attempts occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-OS-000471-GPOS-00215
- Vuln IDs
-
- V-203768
- V-56617
- Rule IDs
-
- SV-203768r991579_rule
- SV-70877
Checks: C-3893r375425_chk
Verify the operating system generates audit records for privileged activities or other system-level access. If it does not, this is a finding.
Fix: F-3893r375426_fix
Configure the operating system to generate audit records for privileged activities or other system-level access.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-OS-000471-GPOS-00216
- Vuln IDs
-
- V-203769
- V-56615
- Rule IDs
-
- SV-203769r991580_rule
- SV-70875
Checks: C-3894r375428_chk
Verify the audit system is configured to audit the loading and unloading of dynamic kernel modules. If it does not, this is a finding.
Fix: F-3894r375429_fix
Configure the audit system to audit the loading and unloading of dynamic kernel modules.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-OS-000472-GPOS-00217
- Vuln IDs
-
- V-203770
- V-56613
- Rule IDs
-
- SV-203770r991581_rule
- SV-70873
Checks: C-3895r375431_chk
Verify the operating system generates audit records showing starting and ending time for user access to the system. If it does not, this is a finding.
Fix: F-3895r375432_fix
Configure the operating system to generate audit records showing starting and ending time for user access to the system.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-OS-000473-GPOS-00218
- Vuln IDs
-
- V-203771
- V-56611
- Rule IDs
-
- SV-203771r991582_rule
- SV-70871
Checks: C-3896r375704_chk
Verify the operating system generates audit records when concurrent logons to the same account occur from different sources. If it does not, this is a finding.
Fix: F-3896r375705_fix
Configure the operating system to generate audit records when concurrent logons to the same account occur from different sources.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-OS-000474-GPOS-00219
- Vuln IDs
-
- V-203772
- V-56609
- Rule IDs
-
- SV-203772r991583_rule
- SV-70869
Checks: C-3897r375707_chk
Verify the operating system generates audit records when successful/unsuccessful accesses to objects occur. If it does not, this is a finding.
Fix: F-3897r375708_fix
Configure the operating system to generate audit records when successful/unsuccessful accesses to objects occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-OS-000475-GPOS-00220
- Vuln IDs
-
- V-203773
- V-56607
- Rule IDs
-
- SV-203773r991584_rule
- SV-70867
Checks: C-3898r375710_chk
Verify the operating system generates audit records for all direct access to the information system. If it does not, this is a finding.
Fix: F-3898r375711_fix
Configure the operating system to generate audit records for all direct access to the information system.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-OS-000476-GPOS-00221
- Vuln IDs
-
- V-203774
- V-56605
- Rule IDs
-
- SV-203774r991585_rule
- SV-70865
Checks: C-3899r375713_chk
Verify the operating system generates audit records for all account creations, modifications, disabling, and termination events. If it does not, this is a finding.
Fix: F-3899r375714_fix
Configure the operating system to generate audit records for all account creations, modifications, disabling, and termination events.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-OS-000477-GPOS-00222
- Vuln IDs
-
- V-203775
- V-56603
- Rule IDs
-
- SV-203775r991586_rule
- SV-70863
Checks: C-3900r375716_chk
Verify the operating system generates audit records for all kernel module load, unload, and restart actions, and also for all program initiations. If it does not, this is a finding.
Fix: F-3900r375717_fix
Configure the operating system to generate audit records for all kernel module load, unload, and restart actions, and also for all program initiations.
- RMF Control
- SC-13
- Severity
- H
- CCI
- CCI-002450
- Version
- SRG-OS-000478-GPOS-00223
- Vuln IDs
-
- V-203776
- V-56601
- Rule IDs
-
- SV-203776r959006_rule
- SV-70861
Checks: C-3901r877032_chk
Verify the operating system implements NIST FIPS-validated cryptography for the following: to provision digital signatures, to generate cryptographic hashes, and to protect unclassified information requiring confidentiality and cryptographic protection in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards. If it does not, this is a finding.
Fix: F-3901r877031_fix
Configure the operating system to implement NIST FIPS-validated cryptography for the following: to provision digital signatures, to generate cryptographic hashes, and to protect unclassified information requiring confidentiality and cryptographic protection in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- SRG-OS-000479-GPOS-00224
- Vuln IDs
-
- V-203777
- V-56599
- Rule IDs
-
- SV-203777r959008_rule
- SV-70859
Checks: C-3902r375722_chk
Verify the operating system, at a minimum, off-loads interconnected systems in real time and off-loads standalone systems weekly. If it does not, this is a finding.
Fix: F-3902r375723_fix
Configure the operating system to, at a minimum, off-load interconnected systems in real time and off-load standalone systems weekly.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-OS-000480-GPOS-00225
- Vuln IDs
-
- V-203778
- V-56597
- Rule IDs
-
- SV-203778r991587_rule
- SV-70857
Checks: C-3903r375725_chk
Verify the operating system prevents the use of dictionary words for passwords. If it does not, this is a finding.
Fix: F-3903r375726_fix
Configure the operating system to prevent the use of dictionary words for passwords.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-OS-000480-GPOS-00226
- Vuln IDs
-
- V-203779
- V-56595
- Rule IDs
-
- SV-203779r991588_rule
- SV-70855
Checks: C-3904r375728_chk
Verify the operating system enforces a delay of at least 4 seconds between logon prompts following a failed logon attempt. If it does not, this is a finding.
Fix: F-3904r375729_fix
Configure the operating system to enforce a delay of at least 4 seconds between logon prompts following a failed logon attempt.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-OS-000480-GPOS-00227
- Vuln IDs
-
- V-203780
- V-56591
- Rule IDs
-
- SV-203780r991589_rule
- SV-70851
Checks: C-3905r375731_chk
Verify the operating system is configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs. If it is not, this is a finding.
Fix: F-3905r375732_fix
Configure the operating system in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-OS-000480-GPOS-00228
- Vuln IDs
-
- V-203781
- V-56589
- Rule IDs
-
- SV-203781r991590_rule
- SV-70849
Checks: C-3906r375734_chk
Verify the operating system defines default permissions for all authenticated users in such a way that the user can only read and modify their own files. If it does not, this is a finding.
Fix: F-3906r375735_fix
Configure the operating system to define default permissions for all authenticated users in such a way that the user can only read and modify their own files.
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- SRG-OS-000480-GPOS-00229
- Vuln IDs
-
- V-203782
- V-56587
- Rule IDs
-
- SV-203782r991591_rule
- SV-70847
Checks: C-3907r375737_chk
If the operating system provides a public access service, such as a kiosk, this is not applicable. Verify the operating system does not allow an unattended or automatic logon to the system. If it does, this is a finding. Automatic logon as an authorized user allows access to any user with physical access to the operating system.
Fix: F-3907r375738_fix
If the operating system provides a public access service, such as a kiosk, this is not applicable. Configure the operating system to not allow an unattended or automatic logon to the system. Automatic logon as an authorized user allows access to any user with physical access to the operating system.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-OS-000480-GPOS-00230
- Vuln IDs
-
- V-203783
- V-56583
- Rule IDs
-
- SV-203783r991592_rule
- SV-70843
Checks: C-3908r375740_chk
Verify the operating system limits the ability of non-privileged users to grant other users direct access to the contents of their home directories/folders. If it does not, this is a finding.
Fix: F-3908r375741_fix
Configure the operating system to limit the ability of non-privileged users to grant other users direct access to the contents of their home directories/folders.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-OS-000480-GPOS-00232
- Vuln IDs
-
- V-203784
- V-56573
- Rule IDs
-
- SV-203784r991593_rule
- SV-70833
Checks: C-3909r375743_chk
Verify the operating system enabled an application firewall, if available. If it does not, this is a finding. If the operating system does not support an application firewall, this may be downgraded to a CAT III finding.
Fix: F-3909r375744_fix
Ensure the operating system's application firewall is enabled, if available.
- RMF Control
- SC-8
- Severity
- H
- CCI
- CCI-002418
- Version
- SRG-OS-000481-GPOS-00481
- Vuln IDs
-
- V-252688
- V-64813
- Rule IDs
-
- SV-252688r958358_rule
- SV-79303
Checks: C-56144r818982_chk
Verify the operating system protects the confidentiality and integrity of communications with wireless peripherals. If it does not, this is a finding.
Fix: F-56094r818983_fix
Configure the operating system to protect the confidentiality and integrity of communications with wireless peripherals.
- RMF Control
- SI-2
- Severity
- M
- CCI
- CCI-002605
- Version
- SRG-OS-000439-GPOS-00195
- Vuln IDs
-
- V-259333
- Rule IDs
-
- SV-259333r958940_rule
Checks: C-63072r939262_chk
Review the operating system documentation and configuration to determine if the operating system checks with a patch management system to install security-relevant software updates within a timeframe directed by an authoritative source. If the operating system does not install security-relevant patches within the time period directed by the authoritative source, this is a finding.
Fix: F-62980r939263_fix
Configure the operating system to use a patch management system to ensure security-relevant updates are installed within the time period directed by the authoritative source.
- RMF Control
- Severity
- M
- CCI
- CCI-003628
- Version
- SRG-OS-000590-GPOS-00110
- Vuln IDs
-
- V-263650
- Rule IDs
-
- SV-263650r982553_rule
Checks: C-67563r982552_chk
Verify the operating system is configured to disable accounts when the accounts are no longer associated to a user. If the operating system is not configured to disable accounts when the accounts are no longer associated to a user, this is a finding.
Fix: F-67471r982219_fix
Configure the operating system to disable accounts when the accounts are no longer associated to a user.
- RMF Control
- Severity
- M
- CCI
- CCI-003959
- Version
- SRG-OS-000690-GPOS-00140
- Vuln IDs
-
- V-263651
- Rule IDs
-
- SV-263651r982555_rule
Checks: C-67564r982554_chk
Verify the operating system is configured to prohibit the use or connection of unauthorized hardware components. If the operating system is not configured to prohibit the use or connection of unauthorized hardware components, this is a finding.
Fix: F-67472r982222_fix
Configure the operating system to prohibit the use or connection of unauthorized hardware components.
- RMF Control
- Severity
- M
- CCI
- CCI-004047
- Version
- SRG-OS-000705-GPOS-00150
- Vuln IDs
-
- V-263652
- Rule IDs
-
- SV-263652r982557_rule
Checks: C-67565r982556_chk
Verify the operating system is configured to implement multifactor authentication for local, network, and/or remote access to privileged accounts and/or nonprivileged accounts such that the device meets organization-defined strength of mechanism requirements. If the operating system is not configured to implement multifactor authentication for local, network, and/or remote access to privileged accounts and/or nonprivileged accounts such that the device meets organization-defined strength of mechanism requirements, this is a finding.
Fix: F-67473r982225_fix
Configure the operating system to implement multifactor authentication for local, network, and/or remote access to privileged accounts and/or nonprivileged accounts such that the device meets organization-defined strength of mechanism requirements.
- RMF Control
- Severity
- M
- CCI
- CCI-004061
- Version
- SRG-OS-000710-GPOS-00160
- Vuln IDs
-
- V-263653
- Rule IDs
-
- SV-263653r982229_rule
Checks: C-67566r982227_chk
Verify the operating system is configured to, for password-based authentication, verify when users create or update passwords the passwords are not found on the list of commonly-used, expected, or compromised passwords in IA-5 (1) (a). If the operating system is not configured to, for password-based authentication, verify when users create or update passwords the passwords are not found on the list of commonly-used, expected, or compromised passwords in IA-5 (1) (a), this is a finding.
Fix: F-67474r982228_fix
Configure the operating system to verify when users create or update passwords the passwords are not found on the list of commonly-used, expected, or compromised passwords in IA-5 (1) (a) for password-based authentication.
- RMF Control
- Severity
- M
- CCI
- CCI-004063
- Version
- SRG-OS-000720-GPOS-00170
- Vuln IDs
-
- V-263654
- Rule IDs
-
- SV-263654r982232_rule
Checks: C-67567r982230_chk
Verify the operating system is configured to require immediate selection of a new password upon account recovery for password-based authentication. If the operating system is not configured to require immediate selection of a new password upon account recovery for password-based authentication, this is a finding.
Fix: F-67475r982231_fix
Configure the operating system to require immediate selection of a new password upon account recovery for password-based authentication.
- RMF Control
- Severity
- M
- CCI
- CCI-004064
- Version
- SRG-OS-000725-GPOS-00180
- Vuln IDs
-
- V-263655
- Rule IDs
-
- SV-263655r982235_rule
Checks: C-67568r982233_chk
Verify the operating system is configured to allow user selection of long passwords and passphrases, including spaces and all printable characters for password-based authentication. If the operating system is not configured to allow user selection of long passwords and passphrases, including spaces and all printable characters for password-based authentication, this is a finding.
Fix: F-67476r982234_fix
Configure the operating system to allow user selection of long passwords and passphrases, including spaces and all printable characters, for password-based authentication, .
- RMF Control
- Severity
- M
- CCI
- CCI-004065
- Version
- SRG-OS-000730-GPOS-00190
- Vuln IDs
-
- V-263656
- Rule IDs
-
- SV-263656r982238_rule
Checks: C-67569r982236_chk
Verify the operating system is configured to employ automated tools to assist the user in selecting strong password authenticators for password-based authentication. If the operating system is not configured to employ automated tools to assist the user in selecting strong password authenticators for password-based authentication, this is a finding.
Fix: F-67477r982237_fix
Configure the operating system to employ automated tools to assist the user in selecting strong password authenticators for password-based authentication.
- RMF Control
- Severity
- M
- CCI
- CCI-004083
- Version
- SRG-OS-000745-GPOS-00210
- Vuln IDs
-
- V-263657
- Rule IDs
-
- SV-263657r982559_rule
Checks: C-67570r982558_chk
Verify the operating system is configured to accept only external credentials that are NIST-compliant. If the operating system is not configured to accept only external credentials that are NIST-compliant, this is a finding.
Fix: F-67478r982240_fix
Configure the operating system to accept only external credentials that are NIST-compliant.
- RMF Control
- Severity
- M
- CCI
- CCI-004188
- Version
- SRG-OS-000755-GPOS-00220
- Vuln IDs
-
- V-263658
- Rule IDs
-
- SV-263658r982561_rule
Checks: C-67571r982560_chk
Verify the operating system is configured to monitor the use of maintenance tools that execute with increased privilege. If the operating system is not configured to monitor the use of maintenance tools that execute with increased privilege, this is a finding.
Fix: F-67479r982243_fix
Configure the operating system to monitor the use of maintenance tools that execute with increased privilege.
- RMF Control
- Severity
- M
- CCI
- CCI-004909
- Version
- SRG-OS-000775-GPOS-00230
- Vuln IDs
-
- V-263659
- Rule IDs
-
- SV-263659r982563_rule
Checks: C-67572r982562_chk
Verify the operating system is configured to include only approved trust anchors in trust stores or certificate stores managed by the organization. If the operating system is not configured to include only approved trust anchors in trust stores or certificate stores managed by the organization, this is a finding.
Fix: F-67480r982246_fix
Configure the operating system to include only approved trust anchors in trust stores or certificate stores managed by the organization.
- RMF Control
- Severity
- M
- CCI
- CCI-004910
- Version
- SRG-OS-000780-GPOS-00240
- Vuln IDs
-
- V-263660
- Rule IDs
-
- SV-263660r982565_rule
Checks: C-67573r982564_chk
Verify the operating system is configured to provide protected storage for cryptographic keys with organization-defined safeguards and/or hardware protected key store. If the operating system is not configured to provide protected storage for cryptographic keys with organization-defined safeguards and/or hardware protected key store, this is a finding.
Fix: F-67481r982249_fix
Configure the operating system to provide protected storage for cryptographic keys with organization-defined safeguards and/or hardware protected key store.
- RMF Control
- Severity
- M
- CCI
- CCI-004922
- Version
- SRG-OS-000785-GPOS-00250
- Vuln IDs
-
- V-263661
- Rule IDs
-
- SV-263661r982567_rule
Checks: C-67574r982566_chk
Verify the operating system is configured to synchronize system clocks within and between systems or system components. If the operating system is not configured to synchronize system clocks within and between systems or system components, this is a finding.
Fix: F-67482r982252_fix
Configure the operating system to synchronize system clocks within and between systems or system components.
- RMF Control
- Severity
- M
- CCI
- CCI-004961
- Version
- SRG-OS-000805-GPOS-00260
- Vuln IDs
-
- V-263662
- Rule IDs
-
- SV-263662r982569_rule
Checks: C-67575r982568_chk
Verify the operating system is configured to employ automated patch management tools to facilitate flaw remediation to the organization-defined system components. If the operating system is not configured to employ automated patch management tools to facilitate flaw remediation to the organization-defined system components, this is a finding.
Fix: F-67483r982255_fix
Configure the operating system to employ automated patch management tools to facilitate flaw remediation to the organization-defined system components.