1.3 Configure SSH - Check if RhostsAuthentication is set to no and not commented for server. | CIS Solaris 9 v1.3 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
1.3 Configure SSH - Check if RhostsRSAAuthentication is set to no and not commented for server. | CIS Solaris 9 v1.3 | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
2.2.8 - Configuring SSH - disallow host based authentication - 'HostbasedAuthentication = no' | CIS AIX 5.3/6.1 L2 v1.1.0 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
4.03 init.ora - 'remote_os_authent = FALSE' | CIS v1.1.0 Oracle 11g OS L1 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
5.2.6 Ensure SSH IgnoreRhosts is enabled | CIS Ubuntu Linux 14.04 LTS Server L1 v2.1.0 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
5.2.6 Ensure SSH IgnoreRhosts is enabled | CIS Amazon Linux v2.1.0 L1 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
5.2.6 Ensure SSH IgnoreRhosts is enabled | CIS Ubuntu Linux 14.04 LTS Workstation L1 v2.1.0 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
5.2.7 Ensure SSH HostbasedAuthentication is disabled | CIS Ubuntu Linux 14.04 LTS Workstation L1 v2.1.0 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
5.2.7 Ensure SSH HostbasedAuthentication is disabled | CIS Amazon Linux v2.1.0 L1 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
5.2.7 Ensure SSH HostbasedAuthentication is disabled | CIS Ubuntu Linux 14.04 LTS Server L1 v2.1.0 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
5.2.8 Ensure SSH HostbasedAuthentication is disabled | CIS Debian Family Workstation L1 v1.0.0 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
5.2.8 Ensure SSH HostbasedAuthentication is disabled | CIS Debian Family Server L1 v1.0.0 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
5.2.9 Ensure SSH HostbasedAuthentication is disabled | CIS Debian 9 Workstation L1 v1.0.1 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
5.2.9 Ensure SSH HostbasedAuthentication is disabled | CIS Debian 9 Server L1 v1.0.1 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
5.2.9 Ensure SSH HostbasedAuthentication is disabled | CIS Fedora 19 Family Linux Server L1 v1.0.0 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
5.2.9 Ensure SSH HostbasedAuthentication is disabled | CIS Aliyun Linux 2 L1 v1.0.0 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
5.2.9 Ensure SSH HostbasedAuthentication is disabled | CIS Fedora 19 Family Linux Workstation L1 v1.0.0 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
5.2.9 Ensure SSH HostbasedAuthentication is disabled | CIS Ubuntu Linux 18.04 LXD Container L1 v1.0.0 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
5.2.9 Ensure SSH HostbasedAuthentication is disabled | CIS Distribution Independent Linux Workstation L1 v2.0.0 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
5.2.9 Ensure SSH HostbasedAuthentication is disabled | CIS Ubuntu Linux 18.04 LXD Host L1 Server v1.0.0 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
5.2.9 Ensure SSH HostbasedAuthentication is disabled | CIS Distribution Independent Linux Server L1 v2.0.0 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
5.2.9 Ensure SSH HostbasedAuthentication is disabled | CIS Ubuntu Linux 18.04 LXD Host L1 Workstation v1.0.0 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
5.2.11 Ensure SSH HostbasedAuthentication is disabled | CIS Amazon Linux 2 STIG v1.0.0 L1 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
5.2.23 Ensure RSA rhosts authentication is not allowed | CIS Amazon Linux 2 STIG v1.0.0 L3 | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
5.3.10 Ensure SSH HostbasedAuthentication is disabled | CIS CentOS 6 Server L1 v3.0.0 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
5.3.10 Ensure SSH HostbasedAuthentication is disabled | CIS Ubuntu Linux 16.04 LTS Workstation L1 v2.0.0 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
5.3.10 Ensure SSH HostbasedAuthentication is disabled | CIS Ubuntu Linux 16.04 LTS Server L1 v2.0.0 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
5.3.10 Ensure SSH HostbasedAuthentication is disabled | CIS CentOS 6 Workstation L1 v3.0.0 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
5.3.10 Ensure SSH HostbasedAuthentication is disabled | CIS Oracle Linux 6 Server L1 v2.0.0 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
5.3.10 Ensure SSH HostbasedAuthentication is disabled | CIS Red Hat 6 Server L1 v3.0.0 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
5.3.10 Ensure SSH HostbasedAuthentication is disabled | CIS Red Hat 6 Workstation L1 v3.0.0 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
5.3.10 Ensure SSH HostbasedAuthentication is disabled | CIS Oracle Linux 6 Workstation L1 v2.0.0 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
6.1.6 Set SSH IgnoreRhosts to yes - Check if IgnoreRhosts is set to yes and not commented for the server. | CIS Solaris 10 L1 v5.2 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
6.1.8 Set SSH RhostsRSAAuthentication to no - Check if RhostsRSAAuthentication is set to no and not commented for the server. | CIS Solaris 10 L1 v5.2 | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
6.4 Disable .rhosts Support in /etc/pam.conf | CIS Solaris 10 L1 v5.2 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
6.5 Disable Rhost-based Authentication for SSH | CIS Solaris 11.2 L1 v1.1.0 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
6.5 Disable Rhost-based Authentication for SSH - IgnoreRhosts = yes | CIS Solaris 11.1 L1 v1.0.0 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
6.8 Disable Host-based Authentication for Login-based Services | CIS Solaris 11.2 L1 v1.1.0 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
6.8 Disable Host-based Authentication for Login-based Services - rlogin auth sufficient pam_rhosts_auth.so.1 | CIS Solaris 11 L1 v1.1.0 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
6.8 Disable Host-based Authentication for Login-based Services - rlogin auth sufficient pam_rhosts_auth.so.1 | CIS Solaris 11.2 L1 v1.1.0 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
6.8 Disable Host-based Authentication for Login-based Services - rsh auth sufficient pam_rhosts_auth.so.1 | CIS Solaris 11.1 L1 v1.0.0 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
9.3.6 Set SSH IgnoreRhosts to Yes | CIS Debian Linux 7 L1 v1.0.0 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
Ensure SSH HostbasedAuthentication is disabled | Tenable Cisco Firepower Management Center OS Best Practices Audit | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
Ensure SSH IgnoreRhosts is enabled | Tenable Cisco Firepower Management Center OS Best Practices Audit | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
GEN000510 - The system must display a publicly-viewable pattern during a graphical desktop environment session lock. | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN000510 - The system must display a publicly-viewable pattern during a graphical desktop environment session lock. | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN000510 - The system must display a publicly-viewable pattern during a graphical desktop environment session lock. | DISA STIG AIX 6.1 v1r14 | Unix | ACCESS CONTROL |
GEN000510 - The system must display a publicly-viewable pattern during a graphical desktop environment session lock. | DISA STIG for Oracle Linux 5 v2r1 | Unix | ACCESS CONTROL, CONFIGURATION MANAGEMENT |