1.1.2 - /etc/security/user - 'minage >= 1' | CIS AIX 5.3/6.1 L1 v1.1.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
1.4 Ensure 'Automatically Lock' is set to 'Immediately' | AirWatch - CIS Google Android 7 v1.0.0 L1 | MDM | IDENTIFICATION AND AUTHENTICATION |
1.5 Ensure 'Power button instantly locks' is set to Enabled | AirWatch - CIS Google Android 7 v1.0.0 L1 | MDM | IDENTIFICATION AND AUTHENTICATION |
1.5 Ensure 'Power button instantly locks' is set to Enabled | MobileIron - CIS Google Android 7 v1.0.0 L1 | MDM | IDENTIFICATION AND AUTHENTICATION |
2.1.7 - AirWatch - Set the 'number of days' for 'maximum password age' | AirWatch - CIS Google Android 4 v1.0.0 L2 | MDM | IDENTIFICATION AND AUTHENTICATION |
2.3.6.5 (L1) Ensure 'Domain member: Maximum machine account password age' is set to '30 or fewer days, but not 0' | CIS Microsoft Windows Server 2019 STIG v2.0.0 L1 DC | Windows | IDENTIFICATION AND AUTHENTICATION |
2.3.6.5 (L1) Ensure 'Domain member: Maximum machine account password age' is set to '30 or fewer days, but not 0' | CIS Microsoft Windows Server 2019 STIG v2.0.0 L1 MS | Windows | IDENTIFICATION AND AUTHENTICATION |
2.3.6.5 (L1) Ensure 'Domain member: Maximum machine account password age' is set to '30 or fewer days, but not 0' | CIS Azure Compute Microsoft Windows Server 2019 v1.0.0 L1 DC | Windows | IDENTIFICATION AND AUTHENTICATION |
2.3.6.5 (L1) Ensure 'Domain member: Maximum machine account password age' is set to '30 or fewer days, but not 0' | CIS Microsoft Windows Server 2019 STIG v2.0.0 STIG DC | Windows | IDENTIFICATION AND AUTHENTICATION |
2.3.6.5 (L1) Ensure 'Domain member: Maximum machine account password age' is set to '30 or fewer days, but not 0' | CIS Microsoft Windows Server 2019 STIG v2.0.0 STIG MS | Windows | IDENTIFICATION AND AUTHENTICATION |
2.3.6.5 (L1) Ensure 'Domain member: Maximum machine account password age' is set to '30 or fewer days, but not 0' | CIS Microsoft Windows Server 2016 STIG v2.0.0 STIG DC | Windows | IDENTIFICATION AND AUTHENTICATION |
2.3.6.5 Ensure 'Domain member: Maximum machine account password age' is set to '30 or fewer days, but not 0' | CIS Azure Compute Microsoft Windows Server 2022 v1.0.0 L1 MS | Windows | IDENTIFICATION AND AUTHENTICATION |
2.3.6.5 Ensure 'Domain member: Maximum machine account password age' is set to '30 or fewer days, but not 0' | CIS Windows Server 2012 R2 MS L1 v3.0.0 | Windows | IDENTIFICATION AND AUTHENTICATION |
2.3.6.5 Ensure 'Domain member: Maximum machine account password age' is set to '30 or fewer days, but not 0' | CIS Windows Server 2012 MS L1 v3.0.0 | Windows | IDENTIFICATION AND AUTHENTICATION |
2.3.6.5 Ensure 'Domain member: Maximum machine account password age' is set to '30 or fewer days, but not 0' | CIS Windows 7 Workstation Level 1 v3.2.0 | Windows | IDENTIFICATION AND AUTHENTICATION |
2.3.6.5 Ensure 'Domain member: Maximum machine account password age' is set to '30 or fewer days, but not 0' | CIS Microsoft Windows Server 2022 STIG v1.0.0 L1 DC | Windows | IDENTIFICATION AND AUTHENTICATION |
2.3.6.5 Ensure 'Domain member: Maximum machine account password age' is set to '30 or fewer days, but not 0' | CIS Microsoft Windows Server 2022 STIG v1.0.0 L1 MS | Windows | IDENTIFICATION AND AUTHENTICATION |
2.6 Ensure 'password_lifetime' is Less Than or Equal to '365' | CIS MySQL 5.7 Community Database L1 v2.0.0 | MySQLDB | IDENTIFICATION AND AUTHENTICATION |
2.8 Set 'Password Expiration' to '90' or less | CIS Microsoft Exchange Server 2016 CAS v1.0.0 | Windows | IDENTIFICATION AND AUTHENTICATION |
4.2 Ensure the vpxuser account's password is automatically changed every 10 or fewer days | CIS VMware ESXi 5.1 v1.0.1 Level 1 | VMware | IDENTIFICATION AND AUTHENTICATION |
5.2.8 Password History | CIS Apple OSX 10.10 Yosemite L1 v1.2.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
5.2.8 Password History | CIS Apple OSX 10.11 El Capitan L1 v1.1.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
5.4.1.1 Ensure password expiration is 365 days or less - users | CIS SUSE Linux Enterprise Server 12 L1 v2.1.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
5.4.1.2 Ensure minimum days between password changes is 7 or more - users | CIS SUSE Linux Enterprise Server 12 L1 v2.1.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
5.4.1.3 Ensure password expiration warning days is 7 or more - login.defs | CIS SUSE Linux Enterprise Server 12 L1 v2.1.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
5.4.1.8 Ensure password expiration is 60 Day maximum for new users | CIS Amazon Linux 2 STIG v1.0.0 L3 | Unix | IDENTIFICATION AND AUTHENTICATION |
5.4.1.9 Ensure password expiration is 60 Day maximum for exisiting passwords | CIS Amazon Linux 2 STIG v1.0.0 L3 | Unix | IDENTIFICATION AND AUTHENTICATION |
5.5.1.1 Ensure password expiration is 365 days or less - login.defs | CIS Red Hat EL8 Server L1 v1.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
5.5.1.1 Ensure password expiration is 365 days or less - login.defs | CIS Red Hat EL8 Workstation L1 v1.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
5.5.1.2 Ensure minimum days between password changes is 7 or more - login.defs | CIS Red Hat EL8 Workstation L1 v1.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
5.5.1.2 Ensure minimum days between password changes is 7 or more - users | CIS Red Hat EL8 Workstation L1 v1.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
5.5.1.3 Ensure password expiration warning days is 7 or more - login.defs | CIS Red Hat EL8 Workstation L1 v1.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
5.5.1.3 Ensure password expiration warning days is 7 or more - login.defs | CIS Red Hat EL8 Server L1 v1.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
7.1 Set Password Expiration Parameters on Active Accounts - MAXWEEKS = 13 | CIS Solaris 11.2 L1 v1.1.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
7.1 Set Password Expiration Parameters on Active Accounts - logins | CIS Solaris 11.1 L1 v1.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
7.2 Set Password Expiration Parameters on Active Accounts - Check MINWEEKS is set to 1 | CIS Solaris 10 L1 v5.2 | Unix | IDENTIFICATION AND AUTHENTICATION |
7.2 Set Password Expiration Parameters on Active Accounts - Check WARNWEEKS is set to 4 | CIS Solaris 10 L1 v5.2 | Unix | IDENTIFICATION AND AUTHENTICATION |
8.3 Set Account Expiration Parameters On Active Accounts, Maximum Password Age less than equal 91 days/13 weeks. | CIS Solaris 9 v1.3 | Unix | IDENTIFICATION AND AUTHENTICATION |
8.3 Set Account Expiration Parameters On Active Accounts, Minimum Password Age greater than equal 7 days / 1 week. | CIS Solaris 9 v1.3 | Unix | IDENTIFICATION AND AUTHENTICATION |
8.4 Create default adduser.conf file | CIS FreeBSD v1.0.5 | Unix | IDENTIFICATION AND AUTHENTICATION |
10.1.1 Set Password Expiration Days | CIS Ubuntu 12.04 LTS Benchmark L1 v1.1.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
10.1.3 Set Password Expiring Warning Days | CIS Ubuntu 12.04 LTS Benchmark L1 v1.1.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
18.9.25.2 (L1) Ensure 'Do not allow password expiration time longer than required by policy' is set to 'Enabled' | CIS Microsoft Windows 10 Enterprise v3.0.0 L1 + BL | Windows | IDENTIFICATION AND AUTHENTICATION |
18.9.25.2 (L1) Ensure 'Do not allow password expiration time longer than required by policy' is set to 'Enabled' | CIS Microsoft Windows Server 2019 v3.0.1 L1 MS | Windows | IDENTIFICATION AND AUTHENTICATION |
20.32 Ensure 'krbtgt account password' is no more than '180 days old' (STIG DC only) | CIS Microsoft Windows Server 2022 STIG v1.0.0 STIG DC | Windows | IDENTIFICATION AND AUTHENTICATION |
Configuring a secure password policy for the BIG-IP system - Expiration Warning | Tenable F5 BIG-IP Best Practice Audit | F5 | IDENTIFICATION AND AUTHENTICATION |
Enforce Password Change Interval | Tenable Cisco ACI | Cisco_ACI | IDENTIFICATION AND AUTHENTICATION |
Extreme : Password Policy - max-age <= 90 | TNS Extreme ExtremeXOS Best Practice Audit | Extreme_ExtremeXOS | IDENTIFICATION AND AUTHENTICATION |
Fortigate - Require that passwords expire | TNS Fortigate FortiOS Best Practices v2.0.0 | FortiGate | IDENTIFICATION AND AUTHENTICATION |
IBM i : Block Password Change (QPWDCHGBLK) - '>=48' | IBM System i Security Reference for V7R2 | AS/400 | IDENTIFICATION AND AUTHENTICATION |