STIGhub
STIGs
RMF Controls
Compare
← CM-3 — Configuration Change Control
CCI-000318
Definition
Monitor and review activities associated with configuration-controlled changes to the system.
Parent Control
CM-3
Configuration Change Control
Configuration Management
Linked STIG Checks (13)
V-204479
CAT II
The Red Hat Enterprise Linux operating system must be configured so that all system device files are correctly labeled to prevent unauthorized modification.
Red Hat Enterprise Linux 7 Security Technical Implementation Guide
V-204488
CAT II
The Red Hat Enterprise Linux operating system must set the umask value to 077 for all local interactive user accounts.
Red Hat Enterprise Linux 7 Security Technical Implementation Guide
V-204501
CAT II
The Red Hat Enterprise Linux operating system must not allow removable media to be used as the boot loader unless approved.
Red Hat Enterprise Linux 7 Security Technical Implementation Guide
V-204575
CAT II
The Red Hat Enterprise Linux operating system must be configured so that the rsyslog daemon does not accept log messages from other servers unless the server is being used for log aggregation.
Red Hat Enterprise Linux 7 Security Technical Implementation Guide
V-204598
CAT II
The Red Hat Enterprise Linux operating system must be configured so that the SSH daemon does not permit Generic Security Service Application Program Interface (GSSAPI) authentication unless needed.
Red Hat Enterprise Linux 7 Security Technical Implementation Guide
V-204599
CAT II
The Red Hat Enterprise Linux operating system must be configured so that the SSH daemon does not permit Kerberos authentication unless needed.
Red Hat Enterprise Linux 7 Security Technical Implementation Guide
V-204621
CAT I
The Red Hat Enterprise Linux operating system must not have the Trivial File Transfer Protocol (TFTP) server package installed if not required for operational support.
Red Hat Enterprise Linux 7 Security Technical Implementation Guide
V-803
CAT II
The system must be checked weekly for unauthorized setuid files as well as unauthorized modification to authorized setuid files.
SUSE Linux Enterprise Server v11 for System z Security Technical Implementation Guide
V-804
CAT II
The system must be checked weekly for unauthorized setgid files as well as unauthorized modification to authorized setgid files.
SUSE Linux Enterprise Server v11 for System z Security Technical Implementation Guide
V-923
CAT III
The system must be checked for extraneous device files at least weekly.
SUSE Linux Enterprise Server v11 for System z Security Technical Implementation Guide
V-230186
CAT II
An active log is not available to keep track of all hardware upgrades and software changes made to the FEP (Front End Processor).
z/OS Front End Processor for ACF2 Security Technical Implementation Guide
V-224486
CAT II
An active log is not available to keep track of all hardware upgrades and software changes made to the FEP (Front End Processor).
z/OS Front End Processor for RACF Security Technical Implementation Guide
V-224723
CAT II
An active log is not available to keep track of all hardware upgrades and software changes made to the FEP (Front End Processor).
zOS Front End Processor for TSS Security Technical Implementation Guide