The organization-defined security configuration checklists reflect the most restrictive mode consistent with operational requirements.
No STIG checks reference this CCI.