1.3.5 Ensure 'Minimum Numeric Letters' is greater than or equal to 1 | CIS Palo Alto Firewall 11 v1.1.0 L1 | Palo_Alto | IDENTIFICATION AND AUTHENTICATION |
1.4.3 Ensure authentication required for single user mode | CIS Debian 10 Workstation L1 v2.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
2.4.1 Ensure 'Allow simple value' is set to 'Disabled' | AirWatch - CIS Apple iOS 17 Benchmark v1.1.0 End User Owned L1 | MDM | IDENTIFICATION AND AUTHENTICATION |
2.4.1 Ensure 'Allow simple value' is set to 'Disabled' | AirWatch - CIS Apple iPadOS 17 v1.1.0 End User Owned L1 | MDM | IDENTIFICATION AND AUTHENTICATION |
3.4.1 Ensure 'Allow simple value' is set to 'Disabled' | MobileIron - CIS Apple iOS 17 Institution Owned L1 | MDM | IDENTIFICATION AND AUTHENTICATION |
4.1.6 Ensure 'Stolen Device Protection' Is Enabled | MobileIron - CIS Apple iPadOS 17 v1.1.0 End User Owned L2 | MDM | IDENTIFICATION AND AUTHENTICATION |
4.2.1 histexpire | CIS IBM AIX 7.1 L1 v2.1.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
4.2.10 Ensure sshd IgnoreRhosts is enabled | CIS Red Hat EL8 Workstation L1 v3.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
4.2.10 Ensure sshd IgnoreRhosts is enabled | CIS Rocky Linux 8 Server L1 v2.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
4.2.10 minlen | CIS IBM AIX 7.1 L1 v2.1.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
4.2.11 minloweralpha | CIS IBM AIX 7.1 L1 v2.1.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
4.2.22 Ensure sshd UsePAM is enabled | CIS Oracle Linux 7 v4.0.0 L1 Server | Unix | IDENTIFICATION AND AUTHENTICATION |
4.2.22 Ensure sshd UsePAM is enabled | CIS CentOS Linux 7 v4.0.0 L1 Server | Unix | IDENTIFICATION AND AUTHENTICATION |
4.2.22 Ensure sshd UsePAM is enabled | CIS CentOS Linux 7 v4.0.0 L1 Workstation | Unix | IDENTIFICATION AND AUTHENTICATION |
4.4.2.2.3 Ensure password length is configured | CIS Red Hat Enterprise Linux 7 v4.0.0 L1 Workstation | Unix | IDENTIFICATION AND AUTHENTICATION |
4.4.3.2.2 Ensure password length is configured | CIS Rocky Linux 8 Server L1 v2.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
4.4.3.3.2 Ensure password history is enforced for the root user | CIS Rocky Linux 8 Server L1 v2.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
4.4.3.3.2 Ensure password history is enforced for the root user | CIS Rocky Linux 8 Workstation L1 v2.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
4.5.1.1 Ensure minimum days between password changes is configured | CIS Debian 10 Server L1 v2.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
4.5.1.2 Ensure password expiration is 365 days or less | CIS Debian 10 Server L1 v2.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
4.5.1.6 Ensure the number of changed characters in a new password is configured | CIS Ubuntu Linux 20.04 LTS Server L1 v2.0.1 | Unix | IDENTIFICATION AND AUTHENTICATION |
4.5.1.6 Ensure the number of changed characters in a new password is configured | CIS Debian 10 Server L1 v2.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
4.5.1.7 Ensure preventing the use of dictionary words for passwords is configured | CIS Ubuntu Linux 20.04 LTS Server L1 v2.0.1 | Unix | IDENTIFICATION AND AUTHENTICATION |
4.5.7 Ensure maximum number of same consecutive characters in a password is configured | CIS Ubuntu Linux 20.04 LTS Server L1 v2.0.1 | Unix | IDENTIFICATION AND AUTHENTICATION |
4.5.7 Ensure maximum number of same consecutive characters in a password is configured | CIS Debian 10 Workstation L1 v2.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
5.1.9 Ensure sshd GSSAPIAuthentication is disabled | CIS Debian Linux 12 v1.1.0 L1 Workstation | Unix | IDENTIFICATION AND AUTHENTICATION |
5.1.11 Ensure sshd IgnoreRhosts is enabled | CIS Debian Linux 12 v1.1.0 L1 Workstation | Unix | IDENTIFICATION AND AUTHENTICATION |
5.1.13 Ensure sshd IgnoreRhosts is enabled | CIS Rocky Linux 9 v2.0.0 L1 Workstation | Unix | IDENTIFICATION AND AUTHENTICATION |
5.3.1.5 Ensure all users last password change date is in the past | CIS Google Container-Optimized OS v1.2.0 L1 Server | Unix | IDENTIFICATION AND AUTHENTICATION |
5.3.3.2.2 Ensure password length is configured | CIS Red Hat Enterprise Linux 9 v2.0.0 L1 Server | Unix | IDENTIFICATION AND AUTHENTICATION |
5.3.3.2.7 Ensure password quality is enforced for the root user | CIS Rocky Linux 9 v2.0.0 L1 Server | Unix | IDENTIFICATION AND AUTHENTICATION |
5.3.3.3.2 Ensure password history is enforced for the root user | CIS Red Hat Enterprise Linux 9 v2.0.0 L1 Workstation | Unix | IDENTIFICATION AND AUTHENTICATION |
5.4.1.1 Ensure password expiration is 365 days or less - users | CIS Debian Family Workstation L1 v1.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
5.4.1.2 Ensure minimum days between password changes is configured - login.defs | CIS Fedora 19 Family Linux Workstation L1 v1.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
5.4.1.3 Ensure password expiration warning days is 7 or more - login.defs | CIS Aliyun Linux 2 L1 v1.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
5.4.1.3 Ensure password expiration warning days is 7 or more - users | CIS Aliyun Linux 2 L1 v1.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
5.5.1.2 Ensure minimum days between password changes is configured - /etc/login.defs | CIS CentOS 6 Workstation L1 v3.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
5.5.1.2 Ensure minimum days between password changes is configured - /etc/shadow | CIS CentOS 6 Workstation L1 v3.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
5.6.1.4 Ensure inactive password lock is 30 days or less | CIS CentOS Linux 8 Workstation L1 v2.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
5.6.1.4 Ensure inactive password lock is 30 days or less | CIS Fedora 28 Family Linux Server L1 v2.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
5.18 Secure individual keychains and items | CIS Apple macOS 10.12 L2 v1.2.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
6.2.1 Ensure password fields are not empty | CIS SUSE Linux Enterprise Server 11 L1 v2.1.1 | Unix | IDENTIFICATION AND AUTHENTICATION |
6.2.2 Ensure /etc/shadow password fields are not empty | CIS Ubuntu Linux 20.04 LTS Server L1 v2.0.1 | Unix | IDENTIFICATION AND AUTHENTICATION |
6.2.2 Ensure /etc/shadow password fields are not empty | CIS Fedora 19 Family Linux Server L1 v1.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
6.2.2 Ensure /etc/shadow password fields are not empty | CIS Oracle Linux 7 v4.0.0 L1 Workstation | Unix | IDENTIFICATION AND AUTHENTICATION |
7.1.3 Set Password Expiring Warning Days - PASS_WARN_AGE >= 7 | CIS Red Hat Enterprise Linux 5 L1 v2.2.1 | Unix | IDENTIFICATION AND AUTHENTICATION |
7.2.2 Ensure /etc/shadow password fields are not empty | CIS Oracle Linux 9 v2.0.0 L1 Workstation | Unix | IDENTIFICATION AND AUTHENTICATION |
7.2.2 Ensure /etc/shadow password fields are not empty | CIS Red Hat Enterprise Linux 9 v2.0.0 L1 Workstation | Unix | IDENTIFICATION AND AUTHENTICATION |
7.2.2 Ensure /etc/shadow password fields are not empty | CIS Rocky Linux 9 v2.0.0 L1 Server | Unix | IDENTIFICATION AND AUTHENTICATION |
7.2.2 Ensure /etc/shadow password fields are not empty | CIS Rocky Linux 9 v2.0.0 L1 Workstation | Unix | IDENTIFICATION AND AUTHENTICATION |