STIGhub
STIGs
RMF Controls
Compare
← CM-11 (2) — User-Installed Software
CCI-001812
Definition
The information system prohibits user installation of software without explicit privileged status.
Parent Control
CM-11 (2)
User-Installed Software
Configuration Management
Linked STIG Checks (64)
V-222510
CAT II
The application must prohibit user installation of software without explicit privileged status.
Application Security and Development Security Technical Implementation Guide
V-251602
CAT II
The programs that can be run through a CA IDMS CV must be defined to the CV to prevent installation of unauthorized programs; must have the ability to dynamically register new programs; and must have the ability to secure tasks.
CA IDMS Security Technical Implementation Guide
V-251603
CAT II
The commands that allow dynamic definitions of PROGRAM/TASK and the dynamic varying of memory must be secured.
CA IDMS Security Technical Implementation Guide
V-261923
CAT II
PostgreSQL must prohibit user installation of logic modules (stored procedures, functions, triggers, views, etc.) without explicit privileged status.
Crunchy Data Postgres 16 Security Technical Implementation Guide
V-235781
CAT II
A policy set using the built-in role-based access control (RBAC) capabilities in the Universal Control Plane (UCP) component of Docker Enterprise must be configured.
Docker Enterprise 2.x Linux/UNIX Security Technical Implementation Guide
V-235782
CAT II
A policy set using the built-in role-based access control (RBAC) capabilities in the Docker Trusted Registry (DTR) component of Docker Enterprise must be set.
Docker Enterprise 2.x Linux/UNIX Security Technical Implementation Guide
V-224200
CAT II
The EDB Postgres Advanced Server must prohibit user installation of logic modules (stored procedures, functions, triggers, views, etc.) without explicit privileged status.
EDB Postgres Advanced Server v11 on Windows Security Technical Implementation Guide
V-213625
CAT II
The EDB Postgres Advanced Server must prohibit user installation of logic modules (stored procedures, functions, triggers, views, etc.) without explicit privileged status.
EDB Postgres Advanced Server v9.6 Security Technical Implementation Guide
V-230946
CAT II
Forescout must prohibit installation of software without explicit privileged permission by only authorized individuals.
Forescout Network Device Management Security Technical Implementation Guide
V-234188
CAT II
The FortiGate device must prohibit installation of software without explicit privileged status.
Fortinet FortiGate Firewall NDM Security Technical Implementation Guide
V-215404
CAT II
AIX must turn on enhanced Role-Based Access Control (RBAC) to isolate security functions from nonsecurity functions, to grant system privileges to other operating system admins, and prohibit user installation of system software without explicit privileged status.
IBM AIX 7.x Security Technical Implementation Guide
V-213723
CAT II
DB2 must prohibit user installation of logic modules (stored procedures, functions, triggers, views, etc.) without explicit privileged status.
IBM DB2 V10.5 LUW Security Technical Implementation Guide
V-237935
CAT II
The IBM z/VM Privilege command class A and Class B must be properly assigned.
IBM zVM Using CA VM:Secure Security Technical Implementation Guide
V-253922
CAT II
The Juniper EX switch must be configured to prohibit installation of software without explicit privileged status.
Juniper EX Series Switches Network Device Management Security Technical Implementation Guide
V-217336
CAT II
The Juniper router must be configured to prohibit installation of software without explicit privileged status.
Juniper Router NDM Security Technical Implementation Guide
V-66485
CAT II
The Juniper SRX Services Gateway must implement logon roles to ensure only authorized roles are allowed to install software and updates.
Juniper SRX SG NDM Security Technical Implementation Guide
V-223202
CAT II
The Juniper SRX Services Gateway must implement logon roles to ensure only authorized roles are allowed to install software and updates.
Juniper SRX Services Gateway NDM Security Technical Implementation Guide
V-213872
CAT II
SQL Server must prohibit user installation of logic modules (stored procedures, functions, triggers, views, etc.) without explicit privileged status.
MS SQL Server 2014 Instance Security Technical Implementation Guide
V-253731
CAT II
MariaDB must prohibit user installation of logic modules (stored procedures, functions, triggers, views, etc.) without explicit privileged status.
MariaDB Enterprise 10.x Security Technical Implementation Guide
V-255318
CAT II
Azure SQL Database must prohibit user installation of logic modules (stored procedures, functions, triggers, views, etc.) without explicit privileged status.
Microsoft Azure SQL Database Security Technical Implementation Guide
V-276234
CAT II
Azure SQL Managed Instance must prohibit user installation of logic modules without explicit privileged status.
Microsoft Azure SQL Managed Instance Security Technical Implementation Guide
V-235753
CAT III
URLs must be allowlisted for plugin use if used.
Microsoft Edge Security Technical Implementation Guide
V-221254
CAT II
The Exchange application directory must be protected from unauthorized access.
Microsoft Exchange 2016 Edge Transport Server Security Technical Implementation Guide
V-228400
CAT II
The Exchange application directory must be protected from unauthorized access.
Microsoft Exchange 2016 Mailbox Server Security Technical Implementation Guide
V-259632
CAT II
The Exchange application directory must be protected from unauthorized access.
Microsoft Exchange 2019 Edge Server Security Technical Implementation Guide
V-259699
CAT II
The Exchange application directory must be protected from unauthorized access.
Microsoft Exchange 2019 Mailbox Server Security Technical Implementation Guide
V-220856
CAT II
Users must be prevented from changing installation options.
Microsoft Windows 10 Security Technical Implementation Guide
V-220857
CAT I
The Windows Installer Always install with elevated privileges must be disabled.
Microsoft Windows 10 Security Technical Implementation Guide
V-253410
CAT II
Users must be prevented from changing installation options.
Microsoft Windows 11 Security Technical Implementation Guide
V-253411
CAT I
The Windows Installer feature "Always install with elevated privileges" must be disabled.
Microsoft Windows 11 Security Technical Implementation Guide
V-224953
CAT II
Users must be prevented from changing installation options.
Microsoft Windows Server 2016 Security Technical Implementation Guide
V-224954
CAT I
The Windows Installer Always install with elevated privileges option must be disabled.
Microsoft Windows Server 2016 Security Technical Implementation Guide
V-205801
CAT II
Windows Server 2019 must prevent users from changing installation options.
Microsoft Windows Server 2019 Security Technical Implementation Guide
V-205802
CAT I
Windows Server 2019 must disable the Windows Installer Always install with elevated privileges option.
Microsoft Windows Server 2019 Security Technical Implementation Guide
V-254373
CAT II
Windows Server 2022 must prevent users from changing installation options.
Microsoft Windows Server 2022 Security Technical Implementation Guide
V-254374
CAT I
Windows Server 2022 must disable the Windows Installer Always install with elevated privileges option.
Microsoft Windows Server 2022 Security Technical Implementation Guide
V-221191
CAT II
MongoDB must prohibit user installation of logic modules (stored procedures, functions, triggers, views, etc.) without explicit privileged status.
MongoDB Enterprise Advanced 3.x Security Technical Implementation Guide
V-252174
CAT II
MongoDB must prohibit user installation of logic modules (stored procedures, functions, triggers, views, etc.) without explicit privileged status.
MongoDB Enterprise Advanced 4.x Security Technical Implementation Guide
V-265941
CAT II
MongoDB must prohibit user installation of logic modules (stored procedures, functions, triggers, views, etc.) without explicit privileged status.
MongoDB Enterprise Advanced 7.x Security Technical Implementation Guide
V-235168
CAT II
The MySQL Database Server 8.0 must prohibit user installation of logic modules (stored procedures, functions, triggers, views, etc.) without explicit privileged status.
Oracle MySQL 8.0 Security Technical Implementation Guide
V-214121
CAT II
PostgreSQL must prohibit user installation of logic modules (functions, trigger procedures, views, etc.) without explicit privileged status.
PostgreSQL 9.x Security Technical Implementation Guide
V-252843
CAT I
Rancher MCM must use a centralized user management solution to support account management functions. For accounts using password authentication, the container platform must use FIPS-validated SHA-2 or later protocol to protect the integrity of the password authentication process.
Rancher Government Solutions Multi-Cluster Manager Security Technical Implementation Guide
V-254572
CAT II
Rancher RKE2 must prohibit the installation of patches, updates, and instantiation of container images without explicit privileged status.
Rancher Government Solutions RKE2 Security Technical Implementation Guide
V-204479
CAT II
The Red Hat Enterprise Linux operating system must be configured so that all system device files are correctly labeled to prevent unauthorized modification.
Red Hat Enterprise Linux 7 Security Technical Implementation Guide
V-204488
CAT II
The Red Hat Enterprise Linux operating system must set the umask value to 077 for all local interactive user accounts.
Red Hat Enterprise Linux 7 Security Technical Implementation Guide
V-204501
CAT II
The Red Hat Enterprise Linux operating system must not allow removable media to be used as the boot loader unless approved.
Red Hat Enterprise Linux 7 Security Technical Implementation Guide
V-204575
CAT II
The Red Hat Enterprise Linux operating system must be configured so that the rsyslog daemon does not accept log messages from other servers unless the server is being used for log aggregation.
Red Hat Enterprise Linux 7 Security Technical Implementation Guide
V-204598
CAT II
The Red Hat Enterprise Linux operating system must be configured so that the SSH daemon does not permit Generic Security Service Application Program Interface (GSSAPI) authentication unless needed.
Red Hat Enterprise Linux 7 Security Technical Implementation Guide
V-204599
CAT II
The Red Hat Enterprise Linux operating system must be configured so that the SSH daemon does not permit Kerberos authentication unless needed.
Red Hat Enterprise Linux 7 Security Technical Implementation Guide
V-204621
CAT I
The Red Hat Enterprise Linux operating system must not have the Trivial File Transfer Protocol (TFTP) server package installed if not required for operational support.
Red Hat Enterprise Linux 7 Security Technical Implementation Guide
V-257513
CAT I
OpenShift role-based access controls (RBAC) must be enforced.
Red Hat OpenShift Container Platform 4.x Security Technical Implementation Guide
V-251208
CAT II
Redis Enterprise DBMS must prohibit user installation of logic modules (stored procedures, functions, triggers, views, etc.) without explicit privileged status.
Redis Enterprise 6.x Security Technical Implementation Guide
V-241008
CAT II
Tanium must prohibit user installation of software without explicit privileged status and enforce access restrictions associated with changes to application configuration.
Tanium 7.0 Security Technical Implementation Guide
V-234069
CAT II
The Tanium application must prohibit user installation of software without explicit privileged status.
Tanium 7.3 Security Technical Implementation Guide
V-254938
CAT II
The Tanium application must prohibit user installation of software without explicit privileged status.
Tanium 7.x Application on TanOS Security Technical Implementation Guide
V-253795
CAT II
The Tanium application must prohibit user installation of software without explicit privileged status.
Tanium 7.x Security Technical Implementation Guide
V-241162
CAT II
Trend Deep Security must prohibit user installation of software without explicit privileged status.
Trend Micro Deep Security 9.x Security Technical Implementation Guide
V-265292
CAT I
The NSX Manager must assign users/accounts to organization-defined roles configured with approved authorizations.
VMware NSX 4.x Manager NDM Security Technical Implementation Guide
V-73583
CAT II
Users must be prevented from changing installation options.
Windows Server 2016 Security Technical Implementation Guide
V-73583
CAT II
Users must be prevented from changing installation options.
Windows Server 2016 Security Technical Implementation Guide
V-73585
CAT I
The Windows Installer Always install with elevated privileges option must be disabled.
Windows Server 2016 Security Technical Implementation Guide
V-73585
CAT I
The Windows Installer Always install with elevated privileges option must be disabled.
Windows Server 2016 Security Technical Implementation Guide
V-93199
CAT II
Windows Server 2019 must prevent users from changing installation options.
Windows Server 2019 Security Technical Implementation Guide
V-93201
CAT I
Windows Server 2019 must disable the Windows Installer Always install with elevated privileges option.
Windows Server 2019 Security Technical Implementation Guide