1.1.2 Install and configure HP-UX Secure Shell 'IgnoreRhosts=yes' | CIS HP-UX 11i v1.5 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
1.1.2 Install and configure HP-UX Secure Shell 'RhostsAuthentication=no' | CIS HP-UX 11i v1.5 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
1.1.2 Install and configure HP-UX Secure Shell 'RhostsRSAAuthentication=no' | CIS HP-UX 11i v1.5 | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
1.2 Ensure 'Screen Lock' is set to Enabled | AirWatch - CIS Google Android v1.2.0 L1 | MDM | ACCESS CONTROL |
1.2 Ensure 'Screen Lock' is set to Enabled | MobileIron - CIS Google Android v1.2.0 L1 | MDM | ACCESS CONTROL |
1.4.2.2 Disable automatic login | CIS Apple OSX 10.6 Snow Leopard L1 v1.0.0 | Unix | ACCESS CONTROL |
1.4.13.2 Disable automatic login | CIS Apple OSX 10.6 Snow Leopard L1 v1.0.0 | Unix | ACCESS CONTROL |
1.4.14.8 Secure Remote Login 'HostbasedAuthentication' | CIS Apple OSX 10.6 Snow Leopard L2 v1.0.0 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
1.4.14.8 Secure Remote Login 'IgnoreRhosts' | CIS Apple OSX 10.6 Snow Leopard L2 v1.0.0 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
1.470 - The system must not allow a non-certificate trusted host SSH logon to the system. | Tenable Fedora Linux Best Practices v2.0.0 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
2.4.2.2 Disable Automatic Login & 2.4.13.2 Disable Automatic Login | CIS Apple OSX 10.5 Leopard L1 v1.0.0 | Unix | ACCESS CONTROL |
5.2.6 Ensure SSH IgnoreRhosts is enabled | CIS Amazon Linux v2.0.0 L1 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
5.2.6 Ensure SSH IgnoreRhosts is enabled | CIS Ubuntu Linux 14.04 LTS Server L1 v2.0.0 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
5.2.6 Ensure SSH IgnoreRhosts is enabled | CIS SUSE Linux Enterprise Server 11 L1 v2.0.0 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
5.2.6 Ensure SSH IgnoreRhosts is enabled | CIS SUSE Linux Enterprise Workstation 12 L1 v2.1.0 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
5.2.6 Ensure SSH IgnoreRhosts is enabled | CIS Ubuntu Linux 14.04 LTS Workstation L1 v2.0.0 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
5.2.6 Ensure SSH IgnoreRhosts is enabled | CIS SUSE Linux Enterprise Workstation 11 L1 v2.0.0 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
5.2.6 Ensure SSH IgnoreRhosts is enabled | CIS Oracle Linux 6 Server L1 v1.1.0 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
5.2.6 Ensure SSH IgnoreRhosts is enabled | CIS Oracle Linux 6 Workstation L1 v1.1.0 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
5.2.7 Ensure SSH HostbasedAuthentication is disabled | CIS SUSE Linux Enterprise Workstation 12 L1 v2.1.0 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
5.2.7 Ensure SSH HostbasedAuthentication is disabled | CIS SUSE Linux Enterprise Workstation 11 L1 v2.0.0 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
5.2.7 Ensure SSH HostbasedAuthentication is disabled | CIS Ubuntu Linux 14.04 LTS Server L1 v2.0.0 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
5.2.7 Ensure SSH HostbasedAuthentication is disabled | CIS Amazon Linux v2.0.0 L1 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
5.2.7 Ensure SSH HostbasedAuthentication is disabled | CIS Ubuntu Linux 14.04 LTS Workstation L1 v2.0.0 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
5.2.7 Ensure SSH HostbasedAuthentication is disabled | CIS SUSE Linux Enterprise Server 11 L1 v2.0.0 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
5.2.7 Ensure SSH HostbasedAuthentication is disabled | CIS Distribution Independent Linux Server L1 v1.1.0 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
5.2.8 Ensure SSH IgnoreRhosts is enabled | CIS Debian 9 Server L1 v1.0.0 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
5.5 Disable automatic login | CIS Apple OSX 10.9 Mavericks L1 v1.0.0 | Unix | ACCESS CONTROL |
5.8 Disable automatic login | CIS Apple OSX 10.10 Yosemite L1 v1.1.0 | Unix | ACCESS CONTROL |
5.8 Disable automatic login | CIS Apple OSX 10.11 El Capitan L1 v1.0.0 | Unix | ACCESS CONTROL |
5.8 Disable automatic login | CIS Apple macOS 10.15 v1.3.0 L1 | Unix | ACCESS CONTROL |
5.8 Disable automatic login | CIS Apple macOS 10.14 v1.3.0 L1 | Unix | ACCESS CONTROL |
5.8 Disable automatic login | CIS Apple macOS 11 v1.1.0 L1 | Unix | ACCESS CONTROL |
5.9 Disable automatic login | CIS Apple macOS 10.12 L1 v1.1.0 | Unix | ACCESS CONTROL |
5.12 Disable automatic login | CIS Apple macOS 10.13 L1 v1.0.0 | Unix | ACCESS CONTROL |
6.1.6 Set SSH IgnoreRhosts to yes - Check if IgnoreRhosts is set to yes and not commented for the server. | CIS Solaris 10 v5.2 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
6.1.7 Set SSH RhostsAuthentication to no - Check if RhostsAuthentication is set to no and not commented for the server. | CIS Solaris 10 v5.2 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
6.1.8 Set SSH RhostsRSAAuthentication to no - Check if RhostsRSAAuthentication is set to no and not commented for the server. | CIS Solaris 10 v5.2 | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
6.4 Disable .rhosts Support in /etc/pam.conf | CIS Solaris 10 v5.2 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
8.4.5 Ensure Autologon is disabled | CIS VMware ESXi 6.7 v1.1.0 Level 2 | VMware | ACCESS CONTROL |
AirWatch - Android - Require Passcode = True | AirWatch - TNS MDM Best Practices Audit v1.1.0 | MDM | ACCESS CONTROL |
AirWatch - iOS - Require passcode | AirWatch - TNS MDM Best Practices Audit v1.1.0 | MDM | ACCESS CONTROL |
MobileIron - Android/Windows Phone/iOS - Require Passcode = True | MobileIron - TNS MDM Best Practices Audit v1.1.0 | MDM | ACCESS CONTROL |
PCI 2.2.4 Configure system security parameters to prevent misuse - Configure SSH (/etc/ssh/sshd_config RhostsAuthentication) | PCI DSS 2.0/3.0 - Solaris 10 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
PCI 2.2.4 Configure system security parameters to prevent misuse - Configure SSH (/etc/ssh/sshd_config RhostsRSAAuthentication) | PCI DSS 2.0/3.0 - Solaris 10 | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
PCI 2.2.4 Configure system security parameters to prevent misuse - Configure SSH (etc/ssh/sshd_config IgnoreRhosts) | PCI DSS 2.0/3.0 - Solaris 10 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
PCI 2.2.4 Verify common security parameter settings - Remove .rhosts Support In PAM Configuration Files. | PCI DSS 2.0/3.0 - Red Hat Linux | Unix | ACCESS CONTROL |
PCI 4.1 - Verify that the protocol is implemented to use only secure configurations - '/etc/ssh/sshd_config HostbasedAuthentication = no' | PCI DSS 2.0/3.0 - AIX | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
PCI 4.1 - Verify that the protocol is implemented to use only secure configurations - '/etc/ssh/sshd_config IgnoreRhosts = yes' | PCI DSS 2.0/3.0 - AIX | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
VM: disable-unexposed-features-autologon | TNS VMWare vSphere Best Practices | VMware | ACCESS CONTROL |