Item Search

NameAudit NamePluginCategory
AIOS-17-006600 - Apple iOS/iPadOS 17 must be configured to not allow passwords that include more than four repeating or sequential characters.MobileIron - DISA Apple iOS/iPadOS 17 v2r1MDM

IDENTIFICATION AND AUTHENTICATION

AIOS-17-006600 - Apple iOS/iPadOS 17 must be configured to not allow passwords that include more than four repeating or sequential characters.AirWatch - DISA Apple iOS/iPadOS 17 v2r1MDM

IDENTIFICATION AND AUTHENTICATION

CASA-ND-000490 - The Cisco ASA must be configured to enforce a minimum 15-character password length.DISA STIG Cisco ASA NDM v2r1Cisco

IDENTIFICATION AND AUTHENTICATION

CASA-ND-000530 - The Cisco ASA must be configured to enforce password complexity by requiring that at least one lowercase character be used.DISA STIG Cisco ASA NDM v2r1Cisco

IDENTIFICATION AND AUTHENTICATION

CASA-ND-000570 - The Cisco ASA must be configured to enforce password complexity by requiring that at least one special character be used.DISA STIG Cisco ASA NDM v2r1Cisco

IDENTIFICATION AND AUTHENTICATION

EPAS-00-004250 - If DBMS authentication, using passwords, is employed, EDB Postgres Advanced Server must enforce the DOD standards for password complexity and lifetime.EnterpriseDB PostgreSQL Advanced Server DB v2r1PostgreSQLDB

IDENTIFICATION AND AUTHENTICATION

GOOG-13-006000 - Google Android 13 must be configured to enforce a minimum password length of six characters.AirWatch - DISA Google Android 13 COBO v2r1MDM

IDENTIFICATION AND AUTHENTICATION

GOOG-13-006000 - Google Android 13 must be configured to enforce a minimum password length of six characters.AirWatch - DISA Google Android 13 COPE v2r1MDM

IDENTIFICATION AND AUTHENTICATION

GOOG-13-006000 - Google Android 13 must be configured to enforce a minimum password length of six characters.MobileIron - DISA Google Android 13 COPE v2r1MDM

IDENTIFICATION AND AUTHENTICATION

GOOG-14-006000 - Google Android 14 must be configured to enforce a minimum password length of six characters.MobileIron - DISA Google Android 14 COBO v2r1MDM

IDENTIFICATION AND AUTHENTICATION

GOOG-14-006000 - Google Android 14 must be configured to enforce a minimum password length of six characters.MobileIron - DISA Google Android 14 COPE v2r1MDM

IDENTIFICATION AND AUTHENTICATION

GOOG-14-006000 - Google Android 14 must be configured to enforce a minimum password length of six characters.AirWatch - DISA Google Android 14 COBO v2r1MDM

IDENTIFICATION AND AUTHENTICATION

GOOG-14-006000 - Google Android 14 must be configured to enforce a minimum password length of six characters.AirWatch - DISA Google Android 14 COPE v2r1MDM

IDENTIFICATION AND AUTHENTICATION

GOOG-14-006100 - Google Android 14 must be configured to not allow passwords that include more than four repeating or sequential characters - AlphanumericMobileIron - DISA Google Android 14 COPE v2r1MDM

IDENTIFICATION AND AUTHENTICATION

GOOG-14-006100 - Google Android 14 must be configured to not allow passwords that include more than four repeating or sequential characters - AlphanumericMobileIron - DISA Google Android 14 COBO v2r1MDM

IDENTIFICATION AND AUTHENTICATION

GOOG-14-006100 - Google Android 14 must be configured to not allow passwords that include more than four repeating or sequential characters - CharactersAirWatch - DISA Google Android 14 COPE v2r1MDM

IDENTIFICATION AND AUTHENTICATION

GOOG-14-006100 - Google Android 14 must be configured to not allow passwords that include more than four repeating or sequential characters - CharactersAirWatch - DISA Google Android 14 COBO v2r1MDM

IDENTIFICATION AND AUTHENTICATION

MADB-10-003700 - If MariaDB authentication, using passwords, is employed, then MariaDB must enforce the DOD standards for password complexity.DISA MariaDB Enterprise 10.x v2r1 DBMySQLDB

IDENTIFICATION AND AUTHENTICATION

OL08-00-020130 - OL 8 must enforce password complexity by requiring that at least one numeric character be used.DISA Oracle Linux 8 STIG v2r1Unix

IDENTIFICATION AND AUTHENTICATION

OL08-00-020150 - OL 8 must require the maximum number of repeating characters be limited to three when passwords are changed.DISA Oracle Linux 8 STIG v2r1Unix

IDENTIFICATION AND AUTHENTICATION

OL08-00-020170 - OL 8 must require the change of at least eight characters when passwords are changed.DISA Oracle Linux 8 STIG v2r1Unix

IDENTIFICATION AND AUTHENTICATION

OL08-00-020200 - OL 8 user account passwords must have a 60-day maximum password lifetime restriction.DISA Oracle Linux 8 STIG v2r1Unix

IDENTIFICATION AND AUTHENTICATION

OL08-00-020210 - OL 8 user account passwords must be configured so that existing passwords are restricted to a 60-day maximum lifetime.DISA Oracle Linux 8 STIG v2r1Unix

IDENTIFICATION AND AUTHENTICATION

OL08-00-020231 - OL 8 passwords for new users must have a minimum of 15 characters.DISA Oracle Linux 8 STIG v2r1Unix

IDENTIFICATION AND AUTHENTICATION

OL08-00-020280 - All OL 8 passwords must contain at least one special character.DISA Oracle Linux 8 STIG v2r1Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-09-411015 - RHEL 9 user account passwords must have a 60-day maximum password lifetime restriction.DISA Red Hat Enterprise Linux 9 STIG v2r1Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-09-611010 - RHEL 9 must ensure the password complexity module in the system-auth file is configured for three retries or less.DISA Red Hat Enterprise Linux 9 STIG v2r1Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-09-611040 - RHEL 9 must ensure the password complexity module is enabled in the password-auth file.DISA Red Hat Enterprise Linux 9 STIG v2r1Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-09-611065 - RHEL 9 must enforce password complexity by requiring that at least one lowercase character be used.DISA Red Hat Enterprise Linux 9 STIG v2r1Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-09-611070 - RHEL 9 must enforce password complexity by requiring that at least one numeric character be used.DISA Red Hat Enterprise Linux 9 STIG v2r1Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-09-611080 - RHEL 9 passwords must have a 24 hours minimum password lifetime restriction in /etc/shadow.DISA Red Hat Enterprise Linux 9 STIG v2r1Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-09-611115 - RHEL 9 must require the change of at least eight characters when passwords are changed.DISA Red Hat Enterprise Linux 9 STIG v2r1Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-09-611125 - RHEL 9 must require the maximum number of repeating characters be limited to three when passwords are changed.DISA Red Hat Enterprise Linux 9 STIG v2r1Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-09-611130 - RHEL 9 must require the change of at least four character classes when passwords are changed.DISA Red Hat Enterprise Linux 9 STIG v2r1Unix

IDENTIFICATION AND AUTHENTICATION

SLES-15-020140 - The SUSE operating system must enforce passwords that contain at least one lowercase character.DISA SLES 15 STIG v2r1Unix

IDENTIFICATION AND AUTHENTICATION

SLES-15-020150 - The SUSE operating system must enforce passwords that contain at least one numeric character.DISA SLES 15 STIG v2r1Unix

IDENTIFICATION AND AUTHENTICATION

SLES-15-020200 - The SUSE operating system must be configured to create or update passwords with a minimum lifetime of 24 hours (one day).DISA SLES 15 STIG v2r1Unix

IDENTIFICATION AND AUTHENTICATION

SLES-15-020210 - The SUSE operating system must employ user passwords with a minimum lifetime of 24 hours (one day).DISA SLES 15 STIG v2r1Unix

IDENTIFICATION AND AUTHENTICATION

SLES-15-020230 - The SUSE operating system must employ user passwords with a maximum lifetime of 60 days.DISA SLES 15 STIG v2r1Unix

IDENTIFICATION AND AUTHENTICATION

SLES-15-020270 - The SUSE operating system must enforce passwords that contain at least one special character.DISA SLES 15 STIG v2r1Unix

IDENTIFICATION AND AUTHENTICATION

SPLK-CL-000350 - Splunk Enterprise must be configured to enforce password complexity by requiring that at least one lowercase character be used.DISA STIG Splunk Enterprise 8.x for Linux v2r1 STIG OSUnix

IDENTIFICATION AND AUTHENTICATION

SPLK-CL-000400 - Splunk Enterprise must be configured to enforce a 60-day maximum password lifetime restriction.DISA STIG Splunk Enterprise 8.x for Linux v2r1 STIG OSUnix

IDENTIFICATION AND AUTHENTICATION

UBTU-22-411025 - Ubuntu 22.04 LTS must enforce 24 hours/one day as the minimum password lifetime. Passwords for new users must have a 24 hours/one day minimum password lifetime restriction.DISA STIG Canonical Ubuntu 22.04 LTS v2r1Unix

IDENTIFICATION AND AUTHENTICATION

WN11-00-000090 - Accounts must be configured to require password expiration.DISA Windows 11 STIG v2r1Windows

IDENTIFICATION AND AUTHENTICATION

WN11-AC-000030 - The minimum password age must be configured to at least 1 day.DISA Windows 11 STIG v2r1Windows

IDENTIFICATION AND AUTHENTICATION

WN11-AC-000040 - The built-in Microsoft password complexity filter must be enabled.DISA Windows 11 STIG v2r1Windows

IDENTIFICATION AND AUTHENTICATION

WN22-00-000020 - Windows Server 2022 passwords for the built-in Administrator account must be changed at least every 60 days.DISA Windows Server 2022 STIG v2r1Windows

IDENTIFICATION AND AUTHENTICATION

WN22-AC-000060 - Windows Server 2022 minimum password age must be configured to at least one day.DISA Windows Server 2022 STIG v2r1Windows

IDENTIFICATION AND AUTHENTICATION

WN22-AC-000070 - Windows Server 2022 minimum password length must be configured to 14 characters.DISA Windows Server 2022 STIG v2r1Windows

IDENTIFICATION AND AUTHENTICATION

WN22-AC-000080 - Windows Server 2022 must have the built-in Windows password complexity policy enabled.DISA Windows Server 2022 STIG v2r1Windows

IDENTIFICATION AND AUTHENTICATION