STIGhub
STIGs
RMF Controls
Compare
← SC-4 — Information in Shared System Resources
CCI-001090
Definition
Prevent unauthorized and unintended information transfer via shared system resources.
Parent Control
SC-4
Information in Shared System Resources
System and Communications Protection
Linked STIG Checks (200)
V-274001
CAT II
Amazon Linux 2023 must restrict access to the kernel message buffer.
Amazon Linux 2023 Security Technical Implementation Guide
V-274002
CAT II
Amazon Linux 2023 must prevent kernel profiling by nonprivileged users.
Amazon Linux 2023 Security Technical Implementation Guide
V-274164
CAT II
Amazon Linux 2023 must ensure a sticky bit be set on all public directories.
Amazon Linux 2023 Security Technical Implementation Guide
V-274165
CAT II
Amazon Linux 2023 must ensure all world-writable directories be owned by root, sys, bin, or an application user.
Amazon Linux 2023 Security Technical Implementation Guide
V-268140
CAT II
A sticky bit must be set on all NixOS public directories to prevent unauthorized and unintended information transferred via shared system resources.
Anduril NixOS Security Technical Implementation Guide
V-254579
CAT II
Apple iOS/iPadOS 16 must not allow backup to remote systems (iCloud).
Apple iOS-iPadOS 16 Security Technical Implementation Guide
V-254600
CAT II
Apple iOS/iPadOS 16 must be configured to not allow backup of [all applications, configuration data] to locally connected systems.
Apple iOS-iPadOS 16 Security Technical Implementation Guide
V-250920
CAT II
Apple iOS/iPadOS 15 must not allow backup to remote systems (iCloud).
Apple iOS/iPadOS 15 Security Technical Implementation Guide
V-250921
CAT II
Apple iOS/iPadOS 15 must not allow backup to remote systems (iCloud document and data synchronization).
Apple iOS/iPadOS 15 Security Technical Implementation Guide
V-250922
CAT II
Apple iOS/iPadOS 15 must not allow backup to remote systems (iCloud Keychain).
Apple iOS/iPadOS 15 Security Technical Implementation Guide
V-250923
CAT II
Apple iOS/iPadOS 15 must not allow backup to remote systems (My Photo Stream).
Apple iOS/iPadOS 15 Security Technical Implementation Guide
V-250924
CAT II
Apple iOS/iPadOS 15 must not allow backup to remote systems (iCloud Photo Sharing, also known as Shared Photo Streams).
Apple iOS/iPadOS 15 Security Technical Implementation Guide
V-250925
CAT II
Apple iOS/iPadOS 15 must not allow backup to remote systems (managed applications data stored in iCloud).
Apple iOS/iPadOS 15 Security Technical Implementation Guide
V-250926
CAT II
Apple iOS/iPadOS 15 must not allow backup to remote systems (enterprise books).
Apple iOS/iPadOS 15 Security Technical Implementation Guide
V-250941
CAT II
Apple iOS/iPadOS 15 must be configured to not allow backup of [all applications, configuration data] to locally connected systems.
Apple iOS/iPadOS 15 Security Technical Implementation Guide
V-257117
CAT II
Apple iOS/iPadOS 16 must be configured to not allow backup of [all applications, configuration data] to locally connected systems.
Apple iOS/iPadOS 16 BYOAD Security Technical Implementation Guide
V-259774
CAT II
Apple iOS/iPadOS 17 must be configured to not allow backup of [all applications, configuration data] to locally connected systems.
Apple iOS/iPadOS 17 MDFPP 3.3 BYOAD Security Technical Implementation Guide
V-258332
CAT II
Apple iOS/iPadOS 17 must be configured to not allow backup of [all applications, configuration data] to locally connected systems.
Apple iOS/iPadOS 17 Security Technical Implementation Guide
V-259186
CAT II
Apple iOS/iPadOS 17 must not allow backup to remote systems (iCloud).
Apple iOS/iPadOS 17 Security Technical Implementation Guide
V-267958
CAT II
Apple iOS/iPadOS 18 must not allow backup to remote systems (iCloud).
Apple iOS/iPadOS 18 Security Technical Implementation Guide
V-267959
CAT II
Apple iOS/iPadOS 18 must not allow backup to remote systems (iCloud document and data synchronization).
Apple iOS/iPadOS 18 Security Technical Implementation Guide
V-267960
CAT II
Apple iOS/iPadOS 18 must not allow backup to remote systems (iCloud Keychain).
Apple iOS/iPadOS 18 Security Technical Implementation Guide
V-267961
CAT II
Apple iOS/iPadOS 18 must not allow backup to remote systems (Cloud Photo Library).
Apple iOS/iPadOS 18 Security Technical Implementation Guide
V-267962
CAT II
Apple iOS/iPadOS 18 must not allow backup to remote systems (iCloud Photo Sharing, also known as Shared Stream or Shared Photo Stream).
Apple iOS/iPadOS 18 Security Technical Implementation Guide
V-267963
CAT II
Apple iOS/iPadOS 18 must not allow backup to remote systems (managed applications data stored in iCloud).
Apple iOS/iPadOS 18 Security Technical Implementation Guide
V-267964
CAT II
Apple iOS/iPadOS 18 must not allow backup to remote systems (enterprise books).
Apple iOS/iPadOS 18 Security Technical Implementation Guide
V-268013
CAT II
Apple iOS/iPadOS 18 must be configured to not allow backup of [all applications, configuration data] to locally connected systems.
Apple iOS/iPadOS 18 Security Technical Implementation Guide
V-268056
CAT II
Apple iOS/iPadOS 18 must disable "Allow USB drive access in Files app" if the authorizing official (AO) has not approved the use of DOD-approved USB storage drives with iOS/iPadOS devices.
Apple iOS/iPadOS 18 Security Technical Implementation Guide
V-278718
CAT II
Apple iOS/iPadOS 26 must not allow backup to remote systems (iCloud).
Apple iOS/iPadOS 26 Security Technical Implementation Guide
V-278719
CAT II
Apple iOS/iPadOS 26 must not allow backup to remote systems (iCloud document and data synchronization).
Apple iOS/iPadOS 26 Security Technical Implementation Guide
V-278720
CAT II
Apple iOS/iPadOS 26 must not allow backup to remote systems (iCloud Keychain).
Apple iOS/iPadOS 26 Security Technical Implementation Guide
V-278721
CAT II
Apple iOS/iPadOS 26 must not allow backup to remote systems (Cloud Photo Library).
Apple iOS/iPadOS 26 Security Technical Implementation Guide
V-278722
CAT II
Apple iOS/iPadOS 26 must not allow backup to remote systems (iCloud Photo Sharing, also known as Shared Stream or Shared Photo Stream).
Apple iOS/iPadOS 26 Security Technical Implementation Guide
V-278723
CAT II
Apple iOS/iPadOS 26 must not allow backup to remote systems (managed applications data stored in iCloud).
Apple iOS/iPadOS 26 Security Technical Implementation Guide
V-278724
CAT II
Apple iOS/iPadOS 26 must not allow backup to remote systems (enterprise books).
Apple iOS/iPadOS 26 Security Technical Implementation Guide
V-278773
CAT II
Apple iOS/iPadOS 26 must be configured to not allow backup of [all applications, configuration data] to locally connected systems.
Apple iOS/iPadOS 26 Security Technical Implementation Guide
V-278815
CAT II
Apple iOS/iPadOS 26 must disable "Allow USB drive access in Files app" if the authorizing official (AO) has not approved the use of DOD-approved USB storage drives with iOS/iPadOS devices.
Apple iOS/iPadOS 26 Security Technical Implementation Guide
V-268555
CAT I
The macOS system must ensure System Integrity Protection is enabled.
Apple macOS 15 (Sequoia) Security Technical Implementation Guide
V-277165
CAT I
The macOS system must ensure System Integrity Protection (SIP) is enabled.
Apple macOS 26 (Tahoe) Security Technical Implementation Guide
V-276375
CAT II
Apple visionOS 2 must not allow backup to remote systems (iCloud).
Apple visionOS 2 Security Technical Implementation Guide
V-276376
CAT II
Apple visionOS 2 must not allow backup to remote systems (iCloud document and data synchronization).
Apple visionOS 2 Security Technical Implementation Guide
V-276377
CAT II
Apple visionOS 2 must not allow backup to remote systems (iCloud Keychain).
Apple visionOS 2 Security Technical Implementation Guide
V-276378
CAT II
Apple visionOS 2 must not allow backup to remote systems (Cloud Photo Library).
Apple visionOS 2 Security Technical Implementation Guide
V-276379
CAT II
Apple visionOS 2 must not allow backup to remote systems (managed applications data stored in iCloud).
Apple visionOS 2 Security Technical Implementation Guide
V-282784
CAT II
Apple visionOS 26 must not allow backup to remote systems (iCloud).
Apple visionOS 26 Security Technical Implementation Guide
V-282785
CAT II
Apple visionOS 26 must not allow backup to remote systems (iCloud document and data synchronization).
Apple visionOS 26 Security Technical Implementation Guide
V-282786
CAT II
Apple visionOS 26 must not allow backup to remote systems (iCloud Keychain).
Apple visionOS 26 Security Technical Implementation Guide
V-282787
CAT II
Apple visionOS 26 must not allow backup to remote systems (Cloud Photo Library).
Apple visionOS 26 Security Technical Implementation Guide
V-282788
CAT II
Apple visionOS 26 must not allow backup to remote systems (managed applications data stored in iCloud).
Apple visionOS 26 Security Technical Implementation Guide
V-222592
CAT II
Applications must prevent unauthorized and unintended information transfer via shared system resources.
Application Security and Development Security Technical Implementation Guide
V-272422
CAT II
A BIND 9.x server implementation must be running in a chroot(ed) directory structure.
BIND 9.x Security Technical Implementation Guide
V-251618
CAT II
IDMS must prevent unauthorized and unintended information transfer via database buffers.
CA IDMS Security Technical Implementation Guide
V-219187
CAT II
The Ubuntu operating system must set a sticky bit on all public directories to prevent unauthorized and unintended information transferred via shared system resources.
Canonical Ubuntu 18.04 LTS Security Technical Implementation Guide
V-255907
CAT III
The Ubuntu operating system must restrict access to the kernel message buffer.
Canonical Ubuntu 18.04 LTS Security Technical Implementation Guide
V-238332
CAT II
The Ubuntu operating system must set a sticky bit on all public directories to prevent unauthorized and unintended information transferred via shared system resources.
Canonical Ubuntu 20.04 LTS Security Technical Implementation Guide
V-255913
CAT III
The Ubuntu operating system must restrict access to the kernel message buffer.
Canonical Ubuntu 20.04 LTS Security Technical Implementation Guide
V-260472
CAT III
Ubuntu 22.04 LTS must restrict access to the kernel message buffer.
Canonical Ubuntu 22.04 LTS Security Technical Implementation Guide
V-260513
CAT II
Ubuntu 22.04 LTS must set a sticky bit on all public directories to prevent unauthorized and unintended information transferred via shared system resources.
Canonical Ubuntu 22.04 LTS Security Technical Implementation Guide
V-270749
CAT III
Ubuntu 24.04 LTS must restrict access to the kernel message buffer.
Canonical Ubuntu 24.04 LTS Security Technical Implementation Guide
V-270750
CAT II
Ubuntu 24.04 LTS must set a sticky bit on all public directories to prevent unauthorized and unintended information transferred via shared system resources.
Canonical Ubuntu 24.04 LTS Security Technical Implementation Guide
V-269425
CAT II
AlmaLinux OS 9 must restrict access to the kernel message buffer.
Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide
V-269426
CAT II
AlmaLinux OS 9 must prevent kernel profiling by nonprivileged users.
Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide
V-269432
CAT II
Any AlmaLinux OS 9 world-writable directories must be owned by root, sys, bin, or an application user.
Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide
V-269433
CAT II
A sticky bit must be set on all AlmaLinux OS 9 public directories.
Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide
V-233127
CAT II
The container platform must prohibit containers from accessing privileged resources.
Container Platform Security Requirements Guide
V-233128
CAT II
The container platform must prevent unauthorized and unintended information transfer via shared system resources.
Container Platform Security Requirements Guide
V-233616
CAT II
Database contents must be protected from unauthorized and unintended information transfer by enforcement of a data-transfer policy.
Crunchy Data PostgreSQL Security Technical Implementation Guide
V-233617
CAT II
Access to database files must be limited to relevant processes and to authorized, administrative users.
Crunchy Data PostgreSQL Security Technical Implementation Guide
V-261903
CAT II
Database contents must be protected from unauthorized and unintended information transfer by enforcement of a data-transfer policy.
Crunchy Data Postgres 16 Security Technical Implementation Guide
V-261904
CAT II
Access to database files must be limited to relevant processes and to authorized, administrative users.
Crunchy Data Postgres 16 Security Technical Implementation Guide
V-206572
CAT II
Database contents must be protected from unauthorized and unintended information transfer by enforcement of a data-transfer policy.
Database Security Requirements Guide
V-206573
CAT II
The DBMS must prevent unauthorized and unintended information transfer via shared system resources.
Database Security Requirements Guide
V-206574
CAT II
Access to database files must be limited to relevant processes and to authorized, administrative users.
Database Security Requirements Guide
V-235781
CAT II
A policy set using the built-in role-based access control (RBAC) capabilities in the Universal Control Plane (UCP) component of Docker Enterprise must be configured.
Docker Enterprise 2.x Linux/UNIX Security Technical Implementation Guide
V-235782
CAT II
A policy set using the built-in role-based access control (RBAC) capabilities in the Docker Trusted Registry (DTR) component of Docker Enterprise must be set.
Docker Enterprise 2.x Linux/UNIX Security Technical Implementation Guide
V-205188
CAT II
The DNS server implementation must prevent unauthorized and unintended information transfer via shared system resources.
Domain Name System (DNS) Security Requirements Guide
V-279956
CAT II
CNAME records must not point to a zone with lesser security for more than six months.
Domain Name System (DNS) Security Requirements Guide
V-224180
CAT II
Database contents must be protected from unauthorized and unintended information transfer by enforcement of a data-transfer policy.
EDB Postgres Advanced Server v11 on Windows Security Technical Implementation Guide
V-224181
CAT II
Access to database files must be limited to relevant processes and to authorized, administrative users.
EDB Postgres Advanced Server v11 on Windows Security Technical Implementation Guide
V-213606
CAT II
Database contents must be protected from unauthorized and unintended information transfer by enforcement of a data-transfer policy.
EDB Postgres Advanced Server v9.6 Security Technical Implementation Guide
V-213607
CAT II
Access to database files must be limited to relevant processes and to authorized, administrative users.
EDB Postgres Advanced Server v9.6 Security Technical Implementation Guide
V-259261
CAT II
Database contents must be protected from unauthorized and unintended information transfer by enforcement of a data transfer policy.
EnterpriseDB Postgres Advanced Server (EPAS) Security Technical Implementation Guide
V-259262
CAT II
Access to database files must be limited to relevant processes and to authorized, administrative users.
EnterpriseDB Postgres Advanced Server (EPAS) Security Technical Implementation Guide
V-203657
CAT II
Operating systems must prevent unauthorized and unintended information transfer via shared system resources.
General Purpose Operating System Security Requirements Guide
V-258486
CAT II
Google Android 13 must be configured to not allow backup of all work profile applications to remote systems.
Google Android 13 BYOAD Security Technical Implementation Guide
V-254779
CAT II
Google Android 13 must be configured to not allow backup of [all applications, configuration data] to locally connected systems.
Google Android 13 COPE Security Technical Implementation Guide
V-254780
CAT II
Google Android 13 must be configured to not allow backup of [all applications, configuration data] to remote systems.
Google Android 13 COPE Security Technical Implementation Guide
V-254799
CAT III
Google Android 13 must allow only the Administrator (MDM) to perform the following management function: Disable Phone Hub.
Google Android 13 COPE Security Technical Implementation Guide
V-258392
CAT II
Google Android 14 must be configured to not allow backup of [all applications, configuration data] to locally connected systems.
Google Android 14 COBO Security Technical Implementation Guide
V-258393
CAT II
Google Android 14 must be configured to not allow backup of [all applications, configuration data] to remote systems.
Google Android 14 COBO Security Technical Implementation Guide
V-258407
CAT III
Google Android 14 must allow only the administrator (MDM) to perform the following management function: Disable Phone Hub.
Google Android 14 COBO Security Technical Implementation Guide
V-258423
CAT II
Google Android 14 must be configured to not allow backup of [all applications, configuration data] to locally connected systems.
Google Android 14 COPE Security Technical Implementation Guide
V-258424
CAT II
Google Android 14 must be configured to not allow backup of [all applications, configuration data] to remote systems.
Google Android 14 COPE Security Technical Implementation Guide
V-258443
CAT III
Google Android 14 must allow only the administrator (MDM) to perform the following management function: Disable Phone Hub.
Google Android 14 COPE Security Technical Implementation Guide
V-260149
CAT II
Google Android 14 must be configured to not allow backup of all work profile applications to remote systems.
Google Android 14 MDFPP 3.3 BYOAD Security Technical Implementation Guide
V-267445
CAT II
Google Android 15 must be configured to not allow backup of [all applications, configuration data] to locally connected systems.
Google Android 15 COBO Security Technical Implementation Guide
V-267446
CAT II
Google Android 15 must be configured to not allow backup of [all applications, configuration data] to remote systems.
Google Android 15 COBO Security Technical Implementation Guide
V-267464
CAT III
Google Android 15 must allow only the administrator (MDM) to perform the following management function: Disable Phone Hub.
Google Android 15 COBO Security Technical Implementation Guide
V-267540
CAT II
Google Android 15 must be configured to not allow backup of [all applications, configuration data] to locally connected systems.
Google Android 15 COPE Security Technical Implementation Guide
V-267541
CAT II
Google Android 15 must be configured to not allow backup of [all applications, configuration data] to remote systems.
Google Android 15 COPE Security Technical Implementation Guide
V-267562
CAT III
Google Android 15 must allow only the administrator (MDM) to perform the following management function: Disable Phone Hub.
Google Android 15 COPE Security Technical Implementation Guide
V-276763
CAT II
Google Android 16 must be configured to not allow backup of [all applications, configuration data] to locally connected systems.
Google Android 16 COBO Security Technical Implementation Guide
V-276764
CAT II
Google Android 16 must be configured to not allow backup of [all applications, configuration data] to remote systems.
Google Android 16 COBO Security Technical Implementation Guide
V-276782
CAT III
Google Android 16 must allow only the administrator (MDM) to perform the following management function: Disable Phone Hub.
Google Android 16 COBO Security Technical Implementation Guide
V-276865
CAT II
Google Android 16 must be configured to not allow backup of [all applications, configuration data] to locally connected systems.
Google Android 16 COPE Security Technical Implementation Guide
V-276866
CAT II
Google Android 16 must be configured to not allow backup of [all applications, configuration data] to remote systems.
Google Android 16 COPE Security Technical Implementation Guide
V-276887
CAT III
Google Android 16 must allow only the administrator (MDM) to perform the following management function: Disable Phone Hub.
Google Android 16 COPE Security Technical Implementation Guide
V-274305
CAT II
Honeywell Android 13 must be configured to not allow backup of [all applications, configuration data] to locally connected systems.
Honeywell Android 13 COBO Security Technical Implementation Guide
V-274306
CAT II
Honeywell Android 13 must be configured to not allow backup of [all applications, configuration data] to remote systems.
Honeywell Android 13 COBO Security Technical Implementation Guide
V-274400
CAT II
Honeywell Android 13 must be configured to not allow backup of [all applications, configuration data] to locally connected systems.
Honeywell Android 13 COPE Security Technical Implementation Guide
V-274401
CAT II
Honeywell Android 13 must be configured to not allow backup of [all applications, configuration data] to remote systems.
Honeywell Android 13 COPE Security Technical Implementation Guide
V-213708
CAT II
Database contents must be protected from unauthorized and unintended information transfer by enforcement of a data-transfer policy.
IBM DB2 V10.5 LUW Security Technical Implementation Guide
V-213709
CAT II
Access to database files must be limited to relevant processes and to authorized, administrative users.
IBM DB2 V10.5 LUW Security Technical Implementation Guide
V-223515
CAT II
ACF2 AUTOERAS GSO record value must be set to indicate that ACF2 is controlling the automatic physical erasure of VSAM or non VSAM data sets.
IBM z/OS ACF2 Security Technical Implementation Guide
V-223570
CAT II
IBM z/OS sensitive and critical system data sets must not exist on shared DASD.
IBM z/OS ACF2 Security Technical Implementation Guide
V-223731
CAT II
The IBM RACF ERASE ALL SETROPTS value must be set to ERASE(ALL) on all systems.
IBM z/OS RACF Security Technical Implementation Guide
V-251107
CAT II
IBM z/OS sensitive and critical system data sets must not exist on shared DASDs.
IBM z/OS RACF Security Technical Implementation Guide
V-223955
CAT II
The CA-TSS AUTOERASE Control Option must be set to ALL for all systems.
IBM z/OS TSS Security Technical Implementation Guide
V-224010
CAT II
IBM z/OS sensitive and critical system data sets must not exist on shared DASD.
IBM z/OS TSS Security Technical Implementation Guide
V-237924
CAT II
The IBM z/VM SYSTEM CONFIG file must be configured to clear TDISK on IPL.
IBM zVM Using CA VM:Secure Security Technical Implementation Guide
V-213775
CAT II
Database contents must be protected from unauthorized and unintended information transfer by enforcement of a data-transfer policy.
MS SQL Server 2014 Database Security Technical Implementation Guide
V-213863
CAT II
Access to database files must be limited to relevant processes and to authorized, administrative users.
MS SQL Server 2014 Instance Security Technical Implementation Guide
V-213915
CAT II
Database contents must be protected from unauthorized and unintended information transfer by enforcement of a data-transfer policy.
MS SQL Server 2016 Database Security Technical Implementation Guide
V-213975
CAT II
SQL Server must prevent unauthorized and unintended information transfer via shared system resources.
MS SQL Server 2016 Instance Security Technical Implementation Guide
V-213976
CAT II
SQL Server must prevent unauthorized and unintended information transfer via Instant File Initialization (IFI).
MS SQL Server 2016 Instance Security Technical Implementation Guide
V-213977
CAT II
Access to database files must be limited to relevant processes and to authorized, administrative users.
MS SQL Server 2016 Instance Security Technical Implementation Guide
V-253711
CAT II
Database contents must be protected from unauthorized and unintended information transfer by enforcement of a data-transfer policy.
MariaDB Enterprise 10.x Security Technical Implementation Guide
V-253712
CAT II
MariaDB must prevent unauthorized and unintended information transfer via shared system resources.
MariaDB Enterprise 10.x Security Technical Implementation Guide
V-253713
CAT II
Access to database files must be limited to relevant processes and to authorized, administrative users.
MariaDB Enterprise 10.x Security Technical Implementation Guide
V-220373
CAT II
Access to MarkLogic Server files must be limited to relevant processes and to authorized, administrative users.
MarkLogic Server v9 Security Technical Implementation Guide
V-255309
CAT II
Azure SQL Database contents must be protected from unauthorized and unintended information transfer by enforcement of a data-transfer policy.
Microsoft Azure SQL Database Security Technical Implementation Guide
V-276229
CAT II
Azure SQL Managed Instance contents must be protected from unauthorized and unintended information transfer by enforcement of a data-transfer policy.
Microsoft Azure SQL Managed Instance Security Technical Implementation Guide
V-271173
CAT II
Database contents must be protected from unauthorized and unintended information transfer by enforcement of a data transfer policy.
Microsoft SQL Server 2022 Database Security Technical Implementation Guide
V-271327
CAT II
SQL Server must prevent unauthorized and unintended information transfer via Instant File Initialization (IFI).
Microsoft SQL Server 2022 Instance Security Technical Implementation Guide
V-271328
CAT II
SQL Server must prevent unauthorized and unintended information transfer via shared system resources.
Microsoft SQL Server 2022 Instance Security Technical Implementation Guide
V-271329
CAT II
Access to database files must be limited to relevant processes and to authorized, administrative users.
Microsoft SQL Server 2022 Instance Security Technical Implementation Guide
V-220710
CAT II
Non system-created file shares on a system must limit access to groups that require it.
Microsoft Windows 10 Security Technical Implementation Guide
V-220823
CAT I
Solicited Remote Assistance must not be allowed.
Microsoft Windows 10 Security Technical Implementation Guide
V-220849
CAT II
Local drives must be prevented from sharing with Remote Desktop Session Hosts.
Microsoft Windows 10 Security Technical Implementation Guide
V-220902
CAT II
Windows 10 Kernel (Direct Memory Access) DMA Protection must be enabled.
Microsoft Windows 10 Security Technical Implementation Guide
V-220930
CAT I
Anonymous enumeration of shares must be restricted.
Microsoft Windows 10 Security Technical Implementation Guide
V-220932
CAT I
Anonymous access to Named Pipes and Shares must be restricted.
Microsoft Windows 10 Security Technical Implementation Guide
V-253267
CAT II
Non-system-created file shares on a system must limit access to groups that require it.
Microsoft Windows 11 Security Technical Implementation Guide
V-253382
CAT I
Solicited Remote Assistance must not be allowed.
Microsoft Windows 11 Security Technical Implementation Guide
V-253403
CAT II
Local drives must be prevented from sharing with Remote Desktop Session Hosts.
Microsoft Windows 11 Security Technical Implementation Guide
V-253454
CAT I
Anonymous enumeration of shares must be restricted.
Microsoft Windows 11 Security Technical Implementation Guide
V-253456
CAT I
Anonymous access to Named Pipes and Shares must be restricted.
Microsoft Windows 11 Security Technical Implementation Guide
V-224841
CAT II
Non-system-created file shares on a system must limit access to groups that require it.
Microsoft Windows Server 2016 Security Technical Implementation Guide
V-224945
CAT II
Local drives must be prevented from sharing with Remote Desktop Session Hosts.
Microsoft Windows Server 2016 Security Technical Implementation Guide
V-224975
CAT II
Data files owned by users must be on a different logical partition from the directory server data files.
Microsoft Windows Server 2016 Security Technical Implementation Guide
V-225046
CAT I
Anonymous enumeration of shares must not be allowed.
Microsoft Windows Server 2016 Security Technical Implementation Guide
V-225048
CAT I
Anonymous access to Named Pipes and Shares must be restricted.
Microsoft Windows Server 2016 Security Technical Implementation Guide
V-205721
CAT II
Windows Server 2019 non-system-created file shares must limit access to groups that require it.
Microsoft Windows Server 2019 Security Technical Implementation Guide
V-205722
CAT II
Windows Server 2019 Remote Desktop Services must prevent drive redirection.
Microsoft Windows Server 2019 Security Technical Implementation Guide
V-205723
CAT II
Windows Server 2019 data files owned by users must be on a different logical partition from the directory server data files.
Microsoft Windows Server 2019 Security Technical Implementation Guide
V-205724
CAT I
Windows Server 2019 must not allow anonymous enumeration of shares.
Microsoft Windows Server 2019 Security Technical Implementation Guide
V-205725
CAT I
Windows Server 2019 must restrict anonymous access to Named Pipes and Shares.
Microsoft Windows Server 2019 Security Technical Implementation Guide
V-254260
CAT II
Windows Server 2022 nonsystem-created file shares must limit access to groups that require it.
Microsoft Windows Server 2022 Security Technical Implementation Guide
V-254366
CAT II
Windows Server 2022 Remote Desktop Services must prevent drive redirection.
Microsoft Windows Server 2022 Security Technical Implementation Guide
V-254396
CAT II
Windows Server 2022 data files owned by users must be on a different logical partition from the directory server data files.
Microsoft Windows Server 2022 Security Technical Implementation Guide
V-254467
CAT I
Windows Server 2022 must not allow anonymous enumeration of shares.
Microsoft Windows Server 2022 Security Technical Implementation Guide
V-254469
CAT I
Windows Server 2022 must restrict anonymous access to Named Pipes and Shares.
Microsoft Windows Server 2022 Security Technical Implementation Guide
V-278007
CAT II
Windows Server 2025 nonsystem-created file shares must limit access to groups that require it.
Microsoft Windows Server 2025 Security Technical Implementation Guide
V-278113
CAT II
Windows Server 2025 Remote Desktop Services must prevent drive redirection.
Microsoft Windows Server 2025 Security Technical Implementation Guide
V-278143
CAT II
Windows Server 2025 data files owned by users must be on a different logical partition from the directory server data files.
Microsoft Windows Server 2025 Security Technical Implementation Guide
V-278217
CAT I
Windows Server 2025 must not allow anonymous enumeration of shares.
Microsoft Windows Server 2025 Security Technical Implementation Guide
V-278219
CAT I
Windows Server 2025 must restrict anonymous access to Named Pipes and Shares.
Microsoft Windows Server 2025 Security Technical Implementation Guide
V-260934
CAT II
All containers must be restricted from acquiring additional privileges.
Mirantis Kubernetes Engine Security Technical Implementation Guide
V-260935
CAT II
Host IPC namespace must not be shared.
Mirantis Kubernetes Engine Security Technical Implementation Guide
V-221179
CAT II
Database contents must be protected from unauthorized and unintended information transfer by enforcement of a data-transfer policy.
MongoDB Enterprise Advanced 3.x Security Technical Implementation Guide
V-221180
CAT II
MongoDB must prevent unauthorized and unintended information transfer via shared system resources.
MongoDB Enterprise Advanced 3.x Security Technical Implementation Guide
V-252142
CAT II
MongoDB must prevent unauthorized and unintended information transfer via shared system resources.
MongoDB Enterprise Advanced 4.x Security Technical Implementation Guide
V-252166
CAT II
Database contents must be protected from unauthorized and unintended information transfer by enforcement of a data-transfer policy.
MongoDB Enterprise Advanced 4.x Security Technical Implementation Guide
V-265927
CAT II
Database contents must be protected from unauthorized and unintended information transfer by enforcement of a data-transfer policy.
MongoDB Enterprise Advanced 7.x Security Technical Implementation Guide
V-265928
CAT II
MongoDB must prevent unauthorized and unintended information transfer via shared system resources.
MongoDB Enterprise Advanced 7.x Security Technical Implementation Guide
V-279363
CAT II
Database contents must be protected from unauthorized and unintended information transfer by enforcement of a data-transfer policy.
MongoDB Enterprise Advanced 8.x Security Technical Implementation Guide
V-279364
CAT II
Access to database files must be limited to relevant processes and to authorized, administrative users.
MongoDB Enterprise Advanced 8.x Security Technical Implementation Guide
V-272186
CAT II
Motorola Solutions Android 13 must be configured to not allow backup of [all applications, configuration data] to locally connected systems.
Motorola Solutions Android 13 COBO Security Technical Implementation Guide
V-272187
CAT II
Motorola Solutions Android 13 must be configured to not allow backup of [all applications, configuration data] to remote systems.
Motorola Solutions Android 13 COBO Security Technical Implementation Guide
V-272332
CAT II
Motorola Solutions Android 13 must be configured to not allow backup of [all applications, configuration data] to locally connected systems.
Motorola Solutions Android 13 COPE Security Technical Implementation Guide
V-272333
CAT II
Motorola Solutions Android 13 must be configured to not allow backup of [all applications, configuration data] to remote systems.
Motorola Solutions Android 13 COPE Security Technical Implementation Guide
V-254226
CAT II
Nutanix AOS must be configured to restrict public directories.
Nutanix AOS 5.20.x OS Security Technical Implementation Guide
V-279624
CAT II
Operating systems must prevent unauthorized and unintended information transfer via shared system resources.
Nutanix Acropolis GPOS Security Technical Implementation Guide
V-219783
CAT II
The DBMS must prevent unauthorized and unintended information transfer via shared system resources.
Oracle Database 11.2g Security Technical Implementation Guide
V-238443
CAT II
The DBMS must restrict access to system tables and other configuration information or metadata to DBAs or other authorized users.
Oracle Database 11.2g Security Technical Implementation Guide
V-238457
CAT II
DBMS backup and restoration files must be protected from unauthorized access.
Oracle Database 11.2g Security Technical Implementation Guide
V-220299
CAT II
The DBMS must prevent unauthorized and unintended information transfer via shared system resources.
Oracle Database 12c Security Technical Implementation Guide
V-237708
CAT II
The DBMS must restrict access to system tables and other configuration information or metadata to DBAs or other authorized users.
Oracle Database 12c Security Technical Implementation Guide
V-237722
CAT II
DBMS backup and restoration files must be protected from unauthorized access.
Oracle Database 12c Security Technical Implementation Guide
V-270577
CAT II
Oracle Database contents must be protected from unauthorized and unintended information transfer by enforcement of a data-transfer policy.
Oracle Database 19c Security Technical Implementation Guide
V-270578
CAT II
Access to Oracle Database files must be limited to relevant processes and to authorized, administrative users.
Oracle Database 19c Security Technical Implementation Guide
V-255901
CAT III
The Oracle Linux operating system must restrict access to the kernel message buffer.
Oracle Linux 7 Security Technical Implementation Guide
V-248551
CAT II
A sticky bit must be set on all OL 8 public directories to prevent unauthorized and unintended information transferred via shared system resources.
Oracle Linux 8 Security Technical Implementation Guide
V-248579
CAT III
OL 8 must restrict access to the kernel message buffer.
Oracle Linux 8 Security Technical Implementation Guide
V-248580
CAT III
OL 8 must prevent kernel profiling by nonprivileged users.
Oracle Linux 8 Security Technical Implementation Guide
V-271745
CAT II
OL 9 must restrict access to the kernel message buffer.
Oracle Linux 9 Security Technical Implementation Guide
V-271746
CAT II
OL 9 must prevent kernel profiling by nonprivileged users.
Oracle Linux 9 Security Technical Implementation Guide
V-271779
CAT II
OL 9 must be configured so that a sticky bit must be set on all public directories.
Oracle Linux 9 Security Technical Implementation Guide
V-271785
CAT II
OL 9 world-writable directories must be owned by root, sys, bin, or an application user.
Oracle Linux 9 Security Technical Implementation Guide
V-235152
CAT II
Database contents must be protected from unauthorized and unintended information transfer by enforcement of a data-transfer policy.
Oracle MySQL 8.0 Security Technical Implementation Guide