Item Search

NameAudit NamePluginCategory
5.2.8 Ensure users password required for privilege escalation when using sudo - rootpwCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

ACCESS CONTROL

5.2.8 Ensure users password required for privilege escalation when using sudo - runaspwCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

ACCESS CONTROL

5.2.8 Ensure users password required for privilege escalation when using sudo - targetpwCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

ACCESS CONTROL

OL6-00-000536 - The Oracle Linux operating system must use the invoking user's password for privilege escalation when using 'sudo' - rootpwDISA STIG Oracle Linux 6 v2r7Unix

ACCESS CONTROL

OL6-00-000536 - The Oracle Linux operating system must use the invoking user's password for privilege escalation when using 'sudo' - runaspwDISA STIG Oracle Linux 6 v2r7Unix

ACCESS CONTROL

OL6-00-000536 - The Oracle Linux operating system must use the invoking user's password for privilege escalation when using 'sudo' - targetpwDISA STIG Oracle Linux 6 v2r7Unix

ACCESS CONTROL

OL07-00-010342 - The Oracle Linux operating system must use the invoking user's password for privilege escalation when using 'sudo' - rootpwDISA Oracle Linux 7 STIG v2r9Unix
OL07-00-010342 - The Oracle Linux operating system must use the invoking user's password for privilege escalation when using 'sudo' - rootpwDISA Oracle Linux 7 STIG v2r11Unix
OL07-00-010342 - The Oracle Linux operating system must use the invoking user's password for privilege escalation when using 'sudo' - runaspwDISA Oracle Linux 7 STIG v2r7Unix
OL07-00-010342 - The Oracle Linux operating system must use the invoking user's password for privilege escalation when using 'sudo' - runaspwDISA Oracle Linux 7 STIG v2r11Unix
OL07-00-010342 - The Oracle Linux operating system must use the invoking user's password for privilege escalation when using 'sudo' - targetpwDISA Oracle Linux 7 STIG v2r11Unix
OL07-00-010342 - The Oracle Linux operating system must use the invoking user's password for privilege escalation when using 'sudo'.DISA Oracle Linux 7 STIG v2r14Unix

ACCESS CONTROL

RHEL-07-010342 - The Red Hat Enterprise Linux operating system must use the invoking user's password for privilege escalation when using 'sudo' - rootpwDISA Red Hat Enterprise Linux 7 STIG v3r10Unix
RHEL-07-010342 - The Red Hat Enterprise Linux operating system must use the invoking user's password for privilege escalation when using 'sudo' - rootpwDISA Red Hat Enterprise Linux 7 STIG v3r9Unix
RHEL-07-010342 - The Red Hat Enterprise Linux operating system must use the invoking user's password for privilege escalation when using 'sudo' - runaspwDISA Red Hat Enterprise Linux 7 STIG v3r8Unix
RHEL-07-010342 - The Red Hat Enterprise Linux operating system must use the invoking user's password for privilege escalation when using 'sudo' - targetpwDISA Red Hat Enterprise Linux 7 STIG v3r9Unix
RHEL-07-010342 - The Red Hat Enterprise Linux operating system must use the invoking user's password for privilege escalation when using 'sudo' - targetpwDISA Red Hat Enterprise Linux 7 STIG v3r12Unix
RHEL-07-010342 - The Red Hat Enterprise Linux operating system must use the invoking user's password for privilege escalation when using 'sudo'.DISA Red Hat Enterprise Linux 7 STIG v3r14Unix

ACCESS CONTROL

RHEL-07-010342 - The Red Hat Enterprise Linux operating system must use the invoking user's password for privilege escalation when using 'sudo'. - rootpwDISA Red Hat Enterprise Linux 7 STIG v3r4Unix
RHEL-08-010383 - RHEL 8 must use the invoking user's password for privilege escalation when using 'sudo' - rootpwDISA Red Hat Enterprise Linux 8 STIG v1r3Unix
RHEL-08-010383 - RHEL 8 must use the invoking user's password for privilege escalation when using 'sudo' - rootpwDISA Red Hat Enterprise Linux 8 STIG v1r7Unix
RHEL-08-010383 - RHEL 8 must use the invoking user's password for privilege escalation when using 'sudo' - rootpwDISA Red Hat Enterprise Linux 8 STIG v1r8Unix
RHEL-08-010383 - RHEL 8 must use the invoking user's password for privilege escalation when using 'sudo' - runaspwDISA Red Hat Enterprise Linux 8 STIG v1r8Unix
RHEL-08-010383 - RHEL 8 must use the invoking user's password for privilege escalation when using 'sudo' - sudo.DISA Red Hat Enterprise Linux 8 STIG v1r14Unix

ACCESS CONTROL

RHEL-08-010383 - RHEL 8 must use the invoking user's password for privilege escalation when using 'sudo' - targetpwDISA Red Hat Enterprise Linux 8 STIG v1r11Unix
RHEL-08-010383 - RHEL 8 must use the invoking user's password for privilege escalation when using 'sudo' - targetpwDISA Red Hat Enterprise Linux 8 STIG v1r6Unix
RHEL-08-010383 - RHEL 8 must use the invoking user's password for privilege escalation when using 'sudo' - targetpwDISA Red Hat Enterprise Linux 8 STIG v1r8Unix
SLES-12-010112 - The SUSE operating system must use the invoking user's password for privilege escalation when using 'sudo' - rootpwDISA SLES 12 STIG v2r9Unix
SLES-12-010112 - The SUSE operating system must use the invoking user's password for privilege escalation when using 'sudo' - runaspwDISA SLES 12 STIG v2r7Unix
SLES-12-010112 - The SUSE operating system must use the invoking user's password for privilege escalation when using 'sudo' - targetpwDISA SLES 12 STIG v2r7Unix
SLES-12-010112 - The SUSE operating system must use the invoking user's password for privilege escalation when using 'sudo' - targetpwDISA SLES 12 STIG v2r9Unix
SLES-12-010112 - The SUSE operating system must use the invoking user's password for privilege escalation when using 'sudo'.DISA SLES 12 STIG v2r11Unix
SLES-12-010112 - The SUSE operating system must use the invoking user's password for privilege escalation when using 'sudo'.DISA SLES 12 STIG v2r13Unix

ACCESS CONTROL

SLES-12-010112 - The SUSE operating system must use the invoking user's password for privilege escalation when using 'sudo'. - runaspwDISA SLES 12 STIG v2r6Unix
WPAW-00-000400 - Administrative accounts of all high-value IT resources must be assigned to a specific administrative tier in Active Directory to separate highly privileged administrative accounts from less privileged administrative accounts.DISA MS Windows Privileged Access Workstation v1r2Windows

ACCESS CONTROL, CONFIGURATION MANAGEMENT

WPAW-00-000400 - Administrative accounts of all high-value IT resources must be assigned to a specific administrative tier in Active Directory to separate highly privileged administrative accounts from less privileged administrative accounts.DISA MS Windows Privileged Access Workstation v1r3Windows

ACCESS CONTROL, CONFIGURATION MANAGEMENT

WPAW-00-000400 - Administrative accounts of all high-value IT resources must be assigned to a specific administrative tier in Active Directory to separate highly privileged administrative accounts from less privileged administrative accounts.DISA MS Windows Privileged Access Workstation v2r2Windows
WPAW-00-000400 - Administrative accounts of all high-value IT resources must be assigned to a specific administrative tier in Active Directory to separate highly privileged administrative accounts from less privileged administrative accounts.DISA MS Windows Privileged Access Workstation v2r1Windows

ACCESS CONTROL, CONFIGURATION MANAGEMENT

WPAW-00-000400 - Administrative accounts of all high-value IT resources must be assigned to a specific administrative tier in Active Directory to separate highly privileged administrative accounts from less privileged administrative accounts.DISA MS Windows Privileged Access Workstation v2r3Windows

ACCESS CONTROL, CONFIGURATION MANAGEMENT