CCI|CCI-002824

Title

Implement organization-defined controls to protect its memory from unauthorized code execution.

Reference Item Details

Category: 2024

Audit Items

View all Reference Audit Items

NamePluginAudit Name
1.6 UBTU-22-213020UnixCIS Ubuntu Linux 22.04 LTS STIG v1.0.0 CAT II
1.7 UBTU-22-213025UnixCIS Ubuntu Linux 22.04 LTS STIG v1.0.0 CAT II
1.18 RHEL-09-212045UnixCIS Red Hat Enterprise Linux 9 STIG v1.0.0 CAT II
1.19 RHEL-09-212050UnixCIS Red Hat Enterprise Linux 9 STIG v1.0.0 CAT III
1.24 RHEL-09-213025UnixCIS Red Hat Enterprise Linux 9 STIG v1.0.0 CAT II
1.33 RHEL-09-213070UnixCIS Red Hat Enterprise Linux 9 STIG v1.0.0 CAT II
1.41 RHEL-09-213110UnixCIS Red Hat Enterprise Linux 9 STIG v1.0.0 CAT II
1.128 UBTU-24-700300UnixCIS Ubuntu Linux 24.04 LTS STIG v1.0.0 CAT II
1.129 UBTU-24-700310UnixCIS Ubuntu Linux 24.04 LTS STIG v1.0.0 CAT II
AIX7-00-003096 - AIX must set Stack Execution Disable (SED) system wide mode to all.UnixDISA STIG AIX 7.x v3r1
ALMA-09-044570 - AlmaLinux OS 9 must implement nonexecutable data to protect its memory from unauthorized code execution.UnixDISA CloudLinux AlmaLinux OS 9 STIG v1r2
ALMA-09-044680 - AlmaLinux OS 9 must enable mitigations against processor-based vulnerabilities.UnixDISA CloudLinux AlmaLinux OS 9 STIG v1r2
ALMA-09-044790 - AlmaLinux OS 9 must clear memory when it is freed to prevent use-after-free attacks.UnixDISA CloudLinux AlmaLinux OS 9 STIG v1r2
ALMA-09-044900 - AlmaLinux OS 9 must implement address space layout randomization (ASLR) to protect its memory from unauthorized code execution.UnixDISA CloudLinux AlmaLinux OS 9 STIG v1r2
Big Sur - Configure the System to Protect Memory from Unauthorized Code ExecutionUnixNIST macOS Big Sur v1.4.0 - 800-53r4 High
Big Sur - Configure the System to Protect Memory from Unauthorized Code ExecutionUnixNIST macOS Big Sur v1.4.0 - 800-53r4 Moderate
Big Sur - Configure the System to Protect Memory from Unauthorized Code ExecutionUnixNIST macOS Big Sur v1.4.0 - 800-53r5 High
Big Sur - Configure the System to Protect Memory from Unauthorized Code ExecutionUnixNIST macOS Big Sur v1.4.0 - CNSSI 1253
Big Sur - Configure the System to Protect Memory from Unauthorized Code ExecutionUnixNIST macOS Big Sur v1.4.0 - 800-53r5 Moderate
Big Sur - Configure the System to Protect Memory from Unauthorized Code ExecutionUnixNIST macOS Big Sur v1.4.0 - All Profiles
Catalina - Configure the System to Protect Memory from Unauthorized Code ExecutionUnixNIST macOS Catalina v1.5.0 - 800-53r4 Moderate
Catalina - Configure the System to Protect Memory from Unauthorized Code ExecutionUnixNIST macOS Catalina v1.5.0 - All Profiles
Catalina - Configure the System to Protect Memory from Unauthorized Code ExecutionUnixNIST macOS Catalina v1.5.0 - CNSSI 1253
Catalina - Configure the System to Protect Memory from Unauthorized Code ExecutionUnixNIST macOS Catalina v1.5.0 - 800-53r4 High
Catalina - Configure the System to Protect Memory from Unauthorized Code ExecutionUnixNIST macOS Catalina v1.5.0 - 800-53r5 High
Catalina - Configure the System to Protect Memory from Unauthorized Code ExecutionUnixNIST macOS Catalina v1.5.0 - 800-53r5 Moderate
Monterey - Configure the System to Protect Memory from Unauthorized Code ExecutionUnixNIST macOS Monterey v1.0.0 - 800-53r4 Moderate
Monterey - Configure the System to Protect Memory from Unauthorized Code ExecutionUnixNIST macOS Monterey v1.0.0 - All Profiles
Monterey - Configure the System to Protect Memory from Unauthorized Code ExecutionUnixNIST macOS Monterey v1.0.0 - 800-53r5 High
Monterey - Configure the System to Protect Memory from Unauthorized Code ExecutionUnixNIST macOS Monterey v1.0.0 - 800-53r4 High
Monterey - Configure the System to Protect Memory from Unauthorized Code ExecutionUnixNIST macOS Monterey v1.0.0 - 800-53r5 Moderate
Monterey - Configure the System to Protect Memory from Unauthorized Code ExecutionUnixNIST macOS Monterey v1.0.0 - CNSSI 1253
OL07-00-040201 - The Oracle Linux operating system must implement virtual address space randomization.UnixDISA Oracle Linux 7 STIG v3r3
OL08-00-010420 - OL 8 must implement non-executable data to protect its memory from unauthorized code execution.UnixDISA Oracle Linux 8 STIG v2r5
OL08-00-010430 - OL 8 must implement address space layout randomization (ASLR) to protect its memory from unauthorized code execution.UnixDISA Oracle Linux 8 STIG v2r5
OL09-00-002390 - OL 9 must clear SLUB/SLAB objects to prevent use-after-free attacks.UnixDISA Oracle Linux 9 STIG v1r2
OL09-00-002391 - OL 9 must enable mitigations against processor-based vulnerabilities.UnixDISA Oracle Linux 9 STIG v1r2
OL09-00-002408 - OL 9 must restrict exposed kernel pointer addresses access.UnixDISA Oracle Linux 9 STIG v1r2
OL09-00-002422 - OL 9 must implement nonexecutable data to protect its memory from unauthorized code execution.UnixDISA Oracle Linux 9 STIG v1r2
OL09-00-002423 - OL 9 must implement address space layout randomization (ASLR) to protect its memory from unauthorized code execution.UnixDISA Oracle Linux 9 STIG v1r2
PHTN-30-000065 - The Photon operating system must implement address space layout randomization (ASLR) to protect its memory from unauthorized code execution.UnixDISA STIG VMware vSphere 7.0 Photon OS v1r4
PHTN-40-000160 The Photon operating system must implement address space layout randomization to protect its memory from unauthorized code execution.UnixDISA VMware vSphere 8.0 vCenter Appliance Photon OS 4.0 STIG v2r1
PHTN-67-000069 - The Photon operating system must implement address space layout randomization (ASLR) to protect its memory from unauthorized code execution.UnixDISA STIG VMware vSphere 6.7 Photon OS v1r6
RHEL-08-010420 - RHEL 8 must implement non-executable data to protect its memory from unauthorized code execution.UnixDISA Red Hat Enterprise Linux 8 STIG v2r4
RHEL-08-010430 - RHEL 8 must implement address space layout randomization (ASLR) to protect its memory from unauthorized code execution.UnixDISA Red Hat Enterprise Linux 8 STIG v2r4
RHEL-09-212045 - RHEL 9 must clear memory when it is freed to prevent use-after-free attacks.UnixDISA Red Hat Enterprise Linux 9 STIG v2r4
RHEL-09-212050 - RHEL 9 must enable mitigations against processor-based vulnerabilities.UnixDISA Red Hat Enterprise Linux 9 STIG v2r4
RHEL-09-213025 - RHEL 9 must restrict exposed kernel pointer addresses access.UnixDISA Red Hat Enterprise Linux 9 STIG v2r4
RHEL-09-213070 - RHEL 9 must implement address space layout randomization (ASLR) to protect its memory from unauthorized code execution.UnixDISA Red Hat Enterprise Linux 9 STIG v2r4
RHEL-09-213110 - RHEL 9 must implement nonexecutable data to protect its memory from unauthorized code execution.UnixDISA Red Hat Enterprise Linux 9 STIG v2r4