| 1.4.3 Ensure the operating system requires authentication for rescue mode | CIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIG | Unix | ACCESS CONTROL |
| 1.4.4 Ensure the operating system requires authentication upon booting into emergency mode | CIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIG | Unix | ACCESS CONTROL |
| 1.4.5 Ensure a unique name is set as the superusers account (BIOS) | CIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIG | Unix | ACCESS CONTROL |
| 1.8.2 Ensure GDM disable-user-list is configured | CIS AlmaLinux OS 8 v4.0.0 L1 Server | Unix | CONFIGURATION MANAGEMENT |
| 1.8.2 Ensure GDM disable-user-list is configured | CIS AlmaLinux OS 8 v4.0.0 L1 Workstation | Unix | CONFIGURATION MANAGEMENT |
| 1.8.2 Ensure GDM disable-user-list is configured | CIS Red Hat Enterprise Linux 8 v4.0.0 L1 Workstation | Unix | CONFIGURATION MANAGEMENT |
| 1.8.2 Ensure GDM disable-user-list is configured | CIS Oracle Linux 8 v4.0.0 L1 Server | Unix | CONFIGURATION MANAGEMENT |
| 1.8.2 Ensure GDM disable-user-list is configured | CIS Red Hat Enterprise Linux 10 v1.0.1 L1 Server | Unix | CONFIGURATION MANAGEMENT |
| 1.8.2 Ensure GDM disable-user-list is configured | CIS Rocky Linux 8 v3.0.0 L1 Workstation | Unix | CONFIGURATION MANAGEMENT |
| 5.1.9 Ensure sshd GSSAPIAuthentication is disabled | CIS Oracle Linux 10 v1.0.0 L2 Server | Unix | CONFIGURATION MANAGEMENT |
| 5.1.9 Ensure sshd GSSAPIAuthentication is disabled | CIS AlmaLinux OS 10 v1.0.0 L1 Workstation | Unix | CONFIGURATION MANAGEMENT |
| 5.1.10 Ensure sshd GSSAPIAuthentication is disabled | CIS Red Hat Enterprise Linux 8 STIG v2.0.0 L1 Workstation | Unix | CONFIGURATION MANAGEMENT |
| 5.1.10 Ensure sshd GSSAPIAuthentication is disabled | CIS Red Hat Enterprise Linux 8 STIG v2.0.0 L2 Server | Unix | CONFIGURATION MANAGEMENT |
| 5.1.10 Ensure sshd HostbasedAuthentication is disabled | CIS Rocky Linux 10 v1.0.0 L1 Workstation | Unix | CONFIGURATION MANAGEMENT |
| 5.1.10 Ensure sshd HostbasedAuthentication is disabled | CIS Oracle Linux 10 v1.0.0 L1 Server | Unix | CONFIGURATION MANAGEMENT |
| 5.1.10 Ensure sshd HostbasedAuthentication is disabled | CIS Rocky Linux 10 v1.0.0 L1 Server | Unix | CONFIGURATION MANAGEMENT |
| 5.1.10 Ensure sshd HostbasedAuthentication is disabled | CIS AlmaLinux OS 10 v1.0.0 L1 Workstation | Unix | CONFIGURATION MANAGEMENT |
| 5.1.10 Ensure sshd HostbasedAuthentication is disabled | CIS Red Hat Enterprise Linux 10 v1.0.1 L1 Workstation | Unix | CONFIGURATION MANAGEMENT |
| 5.1.11 Ensure sshd GSSAPIAuthentication is disabled | CIS AlmaLinux OS 8 v4.0.0 L2 Server | Unix | CONFIGURATION MANAGEMENT |
| 5.1.12 Ensure sshd HostbasedAuthentication is disabled | CIS Oracle Linux 8 v4.0.0 L1 Server | Unix | CONFIGURATION MANAGEMENT |
| 5.1.12 Ensure sshd HostbasedAuthentication is disabled | CIS Red Hat Enterprise Linux 8 v4.0.0 L1 Workstation | Unix | CONFIGURATION MANAGEMENT |
| 5.3.1.3 Ensure pam_pwquality module is enabled | CIS Oracle Linux 10 v1.0.0 L1 Server | Unix | CONFIGURATION MANAGEMENT |
| 5.3.1.3 Ensure pam_pwquality module is enabled | CIS Red Hat Enterprise Linux 10 v1.0.1 L1 Server | Unix | CONFIGURATION MANAGEMENT |
| 5.3.1.3 Ensure pam_pwquality module is enabled | CIS Oracle Linux 10 v1.0.0 L1 Workstation | Unix | CONFIGURATION MANAGEMENT |
| 5.3.1.3 Ensure pam_pwquality module is enabled | CIS Red Hat Enterprise Linux 10 v1.0.1 L1 Workstation | Unix | CONFIGURATION MANAGEMENT |
| 5.3.1.3 Ensure pam_pwquality module is enabled | CIS AlmaLinux OS 10 v1.0.0 L1 Server | Unix | CONFIGURATION MANAGEMENT |
| 5.3.2.3 Ensure pam_pwquality module is enabled | CIS Red Hat Enterprise Linux 8 v4.0.0 L1 Server | Unix | CONFIGURATION MANAGEMENT |
| 5.3.2.3 Ensure pam_pwquality module is enabled | CIS Red Hat Enterprise Linux 8 v4.0.0 L1 Workstation | Unix | CONFIGURATION MANAGEMENT |
| 5.3.2.3 Ensure pam_pwquality module is enabled | CIS Red Hat Enterprise Linux 8 STIG v2.0.0 L1 Server | Unix | CONFIGURATION MANAGEMENT |
| 5.3.2.3 Ensure pam_pwquality module is enabled | CIS Red Hat Enterprise Linux 8 STIG v2.0.0 L1 Workstation | Unix | CONFIGURATION MANAGEMENT |
| 5.3.2.3 Ensure pam_pwquality module is enabled | CIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIG | Unix | CONFIGURATION MANAGEMENT |
| 5.3.2.4.1 Ensure pam_unix does not include nullok | CIS Oracle Linux 10 v1.0.0 L1 Server | Unix | CONFIGURATION MANAGEMENT |
| 5.3.2.4.1 Ensure pam_unix does not include nullok | CIS Oracle Linux 10 v1.0.0 L1 Workstation | Unix | CONFIGURATION MANAGEMENT |
| 5.3.2.4.1 Ensure pam_unix does not include nullok | CIS Red Hat Enterprise Linux 10 v1.0.1 L1 Workstation | Unix | CONFIGURATION MANAGEMENT |
| 5.3.2.4.1 Ensure pam_unix does not include nullok | CIS AlmaLinux OS 10 v1.0.0 L1 Server | Unix | CONFIGURATION MANAGEMENT |
| 5.3.3.2.17 Ensure retry is configured on the pam_pwquality module in /etc/pam.d/system-auth | CIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIG | Unix | CONFIGURATION MANAGEMENT |
| 5.3.3.2.18 Ensure retry is configured on the pam_pwquality module in /etc/pam.d/password-auth | CIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIG | Unix | CONFIGURATION MANAGEMENT |
| 5.3.3.2.19 Ensure retry is configured in /etc/security/pwquality.conf | CIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIG | Unix | CONFIGURATION MANAGEMENT |
| 5.3.3.4.1 Ensure pam_unix does not include nullok | CIS Rocky Linux 8 v3.0.0 L1 Workstation | Unix | CONFIGURATION MANAGEMENT |
| 5.3.3.4.1 Ensure pam_unix does not include nullok | CIS Red Hat Enterprise Linux 8 v4.0.0 L1 Server | Unix | CONFIGURATION MANAGEMENT |
| 5.3.3.4.1 Ensure pam_unix does not include nullok | CIS Red Hat Enterprise Linux 8 v4.0.0 L1 Workstation | Unix | CONFIGURATION MANAGEMENT |
| 5.3.3.4.1 Ensure pam_unix does not include nullok | CIS Oracle Linux 8 v4.0.0 L1 Server | Unix | CONFIGURATION MANAGEMENT |
| 7.1.15 Ensure there are no "shosts.equiv" files on the operating system | CIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIG | Unix | CONFIGURATION MANAGEMENT |
| 7.2.2 Ensure /etc/shadow password fields are not empty | CIS Rocky Linux 8 v3.0.0 L1 Server | Unix | CONFIGURATION MANAGEMENT |
| 7.2.2 Ensure /etc/shadow password fields are not empty | CIS Red Hat Enterprise Linux 10 v1.0.1 L1 Workstation | Unix | CONFIGURATION MANAGEMENT |
| 7.2.2 Ensure /etc/shadow password fields are not empty | CIS Red Hat Enterprise Linux 8 v4.0.0 L1 Server | Unix | CONFIGURATION MANAGEMENT |
| 7.2.2 Ensure /etc/shadow password fields are not empty | CIS Oracle Linux 10 v1.0.0 L1 Workstation | Unix | CONFIGURATION MANAGEMENT |
| 7.2.2 Ensure /etc/shadow password fields are not empty | CIS AlmaLinux OS 10 v1.0.0 L1 Workstation | Unix | CONFIGURATION MANAGEMENT |
| 7.2.2 Ensure /etc/shadow password fields are not empty | CIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIG | Unix | CONFIGURATION MANAGEMENT |
| 7.2.2 Ensure /etc/shadow password fields are not empty | CIS Oracle Linux 8 v4.0.0 L1 Server | Unix | CONFIGURATION MANAGEMENT |