AIX7-00-001100 - AIX must be configured to allow users to directly initiate a session lock for all connection types. | DISA STIG AIX 7.x v2r9 | Unix | ACCESS CONTROL |
AOSX-13-030014 - The macOS system must be configured to lock the user session when a smart token is removed. | DISA STIG Apple Mac OSX 10.13 v2r5 | Unix | ACCESS CONTROL |
AOSX-14-000005 - The macOS system must be configured to lock the user session when a smart token is removed. | DISA STIG Apple Mac OSX 10.14 v2r6 | Unix | ACCESS CONTROL |
AOSX-15-000005 - The macOS system must be configured to lock the user session when a smart token is removed. | DISA STIG Apple Mac OSX 10.15 v1r10 | Unix | ACCESS CONTROL |
APPL-11-000005 - The macOS system must be configured to lock the user session when a smart token is removed. | DISA STIG Apple macOS 11 v1r5 | Unix | ACCESS CONTROL |
APPL-11-000005 - The macOS system must be configured to lock the user session when a smart token is removed. | DISA STIG Apple macOS 11 v1r8 | Unix | ACCESS CONTROL |
APPL-12-000005 - The macOS system must be configured to lock the user session when a smart token is removed. | DISA STIG Apple macOS 12 v1r9 | Unix | ACCESS CONTROL |
APPL-13-000005 - The macOS system must be configured to lock the user session when a smart token is removed. | DISA STIG Apple macOS 13 v1r4 | Unix | ACCESS CONTROL |
Big Sur - Configure User Session Lock When a Smart Token is Removed | NIST macOS Big Sur v1.4.0 - 800-53r4 High | Unix | ACCESS CONTROL |
Big Sur - Configure User Session Lock When a Smart Token is Removed | NIST macOS Big Sur v1.4.0 - 800-53r4 Moderate | Unix | ACCESS CONTROL |
Big Sur - Configure User Session Lock When a Smart Token is Removed | NIST macOS Big Sur v1.4.0 - 800-53r5 Moderate | Unix | ACCESS CONTROL |
Big Sur - Configure User Session Lock When a Smart Token is Removed | NIST macOS Big Sur v1.4.0 - 800-171 | Unix | ACCESS CONTROL |
Big Sur - Configure User Session Lock When a Smart Token is Removed | NIST macOS Big Sur v1.4.0 - CNSSI 1253 | Unix | ACCESS CONTROL |
Big Sur - Configure User Session Lock When a Smart Token is Removed | NIST macOS Big Sur v1.4.0 - 800-53r5 High | Unix | ACCESS CONTROL |
Big Sur - Configure User Session Lock When a Smart Token is Removed | NIST macOS Big Sur v1.4.0 - All Profiles | Unix | ACCESS CONTROL |
Catalina - Configure User Session Lock When a Smart Token is Removed | NIST macOS Catalina v1.5.0 - 800-53r4 High | Unix | ACCESS CONTROL |
Catalina - Configure User Session Lock When a Smart Token is Removed | NIST macOS Catalina v1.5.0 - 800-53r5 High | Unix | ACCESS CONTROL |
Catalina - Configure User Session Lock When a Smart Token is Removed | NIST macOS Catalina v1.5.0 - CNSSI 1253 | Unix | ACCESS CONTROL |
Catalina - Configure User Session Lock When a Smart Token is Removed | NIST macOS Catalina v1.5.0 - 800-53r5 Moderate | Unix | ACCESS CONTROL |
Catalina - Configure User Session Lock When a Smart Token is Removed | NIST macOS Catalina v1.5.0 - All Profiles | Unix | ACCESS CONTROL |
Catalina - Configure User Session Lock When a Smart Token is Removed | NIST macOS Catalina v1.5.0 - 800-171 | Unix | ACCESS CONTROL |
Catalina - Configure User Session Lock When a Smart Token is Removed | NIST macOS Catalina v1.5.0 - 800-53r4 Moderate | Unix | ACCESS CONTROL |
Monterey - Configure User Session Lock When a Smart Token is Removed | NIST macOS Monterey v1.0.0 - 800-171 | Unix | ACCESS CONTROL |
Monterey - Configure User Session Lock When a Smart Token is Removed | NIST macOS Monterey v1.0.0 - 800-53r4 High | Unix | ACCESS CONTROL |
Monterey - Configure User Session Lock When a Smart Token is Removed | NIST macOS Monterey v1.0.0 - All Profiles | Unix | ACCESS CONTROL |
Monterey - Configure User Session Lock When a Smart Token is Removed | NIST macOS Monterey v1.0.0 - 800-53r5 Moderate | Unix | ACCESS CONTROL |
Monterey - Configure User Session Lock When a Smart Token is Removed | NIST macOS Monterey v1.0.0 - 800-53r4 Moderate | Unix | ACCESS CONTROL |
Monterey - Configure User Session Lock When a Smart Token is Removed | NIST macOS Monterey v1.0.0 - 800-53r5 High | Unix | ACCESS CONTROL |
Monterey - Configure User Session Lock When a Smart Token is Removed | NIST macOS Monterey v1.0.0 - CNSSI 1253 | Unix | ACCESS CONTROL |
OL6-00-000071 - The system must be configured so all network connections associated with a communication session are terminated at the end of the session or after 15 minutes of inactivity from the user at a command prompt, except to fulfill documented and validated mission requirements. | DISA STIG Oracle Linux 6 v2r7 | Unix | ACCESS CONTROL |
OL6-00-000508 - The system must allow locking of graphical desktop sessions. | DISA STIG Oracle Linux 6 v2r7 | Unix | ACCESS CONTROL |
OL07-00-010060 - The Oracle Linux operating system must enable a user session lock until that user re-establishes access using established identification and authentication procedures. | DISA Oracle Linux 7 STIG v2r14 | Unix | ACCESS CONTROL |
RHEL-06-000508 - The system must allow locking of graphical desktop sessions. | DISA Red Hat Enterprise Linux 6 STIG v2r2 | Unix | ACCESS CONTROL |
RHEL-09-271045 - RHEL 9 must be able to initiate directly a session lock for all connection types using smart card when the smart card is removed. | DISA Red Hat Enterprise Linux 9 STIG v2r2 | Unix | ACCESS CONTROL |
RHEL-09-271050 - RHEL 9 must prevent a user from overriding the disabling of the graphical user smart card removal action. | DISA Red Hat Enterprise Linux 9 STIG v2r2 | Unix | ACCESS CONTROL |
RHEL-09-271055 - RHEL 9 must enable a user session lock until that user re-establishes access using established identification and authentication procedures for graphical user sessions. | DISA Red Hat Enterprise Linux 9 STIG v2r2 | Unix | ACCESS CONTROL |
RHEL-09-271060 - RHEL 9 must prevent a user from overriding the screensaver lock-enabled setting for the graphical user interface. | DISA Red Hat Enterprise Linux 9 STIG v2r2 | Unix | ACCESS CONTROL |
SLES-12-010060 - The SUSE operating system must be able to lock the graphical user interface (GUI). | DISA SLES 12 STIG v2r13 | Unix | ACCESS CONTROL |
SLES-12-010070 - The SUSE operating system must utilize vlock to allow for session locking. | DISA SLES 12 STIG v2r13 | Unix | ACCESS CONTROL |
UBTU-16-010050 - All users must be able to directly initiate a session lock for all connection types. | DISA STIG Ubuntu 16.04 LTS v2r3 | Unix | ACCESS CONTROL |
UBTU-18-010403 - The Ubuntu operating system must be configured for users to directly initiate a session lock for all connection types. | DISA STIG Ubuntu 18.04 LTS v2r15 | Unix | ACCESS CONTROL |
UBTU-20-010005 - The Ubuntu operating system must allow users to directly initiate a session lock for all connection types. | DISA STIG Ubuntu 20.04 LTS v2r1 | Unix | ACCESS CONTROL |
UBTU-22-412025 - Ubuntu 22.04 LTS must allow users to directly initiate a session lock for all connection types. | DISA STIG Canonical Ubuntu 22.04 LTS v2r2 | Unix | ACCESS CONTROL |