Item Search

NameAudit NamePluginCategory
1.1.2 Ensure 'Maximum password age' is set to '60 or fewer days, but not 0'CIS Microsoft Windows 8.1 v2.4.1 L1Windows

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

1.1.3 Ensure 'Minimum password age' is set to '1 or more day(s)'CIS Microsoft Windows 8.1 v2.4.1 L1Windows

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

1.1.6 (L1) Ensure 'Store passwords using reversible encryption' is set to 'Disabled'CIS Microsoft Windows 8.1 v2.4.1 L1 BitlockerWindows

IDENTIFICATION AND AUTHENTICATION

1.1.6 Ensure 'Store passwords using reversible encryption' is set to 'Disabled'CIS Microsoft Windows 8.1 v2.4.1 L1Windows

IDENTIFICATION AND AUTHENTICATION

AIOS-14-009700 - Apple iOS/iPadOS must implement the management setting: use SSL for Exchange ActiveSync.MobileIron - DISA Apple iOS/iPadOS 14 v1r3MDM

IDENTIFICATION AND AUTHENTICATION

AIOS-14-009700 - Apple iOS/iPadOS must implement the management setting: use SSL for Exchange ActiveSync.AirWatch - DISA Apple iOS/iPadOS 14 v1r3MDM

IDENTIFICATION AND AUTHENTICATION

AIOS-16-011300 - Apple iOS/iPadOS 16 must implement the management setting: use SSL for Exchange ActiveSync.AirWatch - DISA Apple iOS/iPadOS 16 v2r1MDM

IDENTIFICATION AND AUTHENTICATION

AMLS-NM-000220 - The Arista Multilayer Switch must use multifactor authentication for local access to privileged accounts.DISA STIG Arista MLS DCS-7000 Series NDM v1r4Arista

IDENTIFICATION AND AUTHENTICATION

AOSX-14-000040 - The macOS system must use replay-resistant authentication mechanisms and implement cryptographic mechanisms to protect the integrity of and verify remote disconnection at the termination of nonlocal maintenance and diagnostic communications, when used for nonlocal maintenance sessions - OpenSSH VersionDISA STIG Apple Mac OSX 10.14 v2r6Unix

IDENTIFICATION AND AUTHENTICATION, MAINTENANCE

AOSX-14-000040 - The macOS system must use replay-resistant authentication mechanisms and implement cryptographic mechanisms to protect the integrity of and verify remote disconnection at the termination of nonlocal maintenance and diagnostic communications, when used for nonlocal maintenance sessions - SSHD currently runningDISA STIG Apple Mac OSX 10.14 v2r6Unix

IDENTIFICATION AND AUTHENTICATION, MAINTENANCE

AOSX-14-000040 - The macOS system must use replay-resistant authentication mechanisms and implement cryptographic mechanisms to protect the integrity of and verify remote disconnection at the termination of nonlocal maintenance and diagnostic communications, when used for nonlocal maintenance sessions - SSHD service disabledDISA STIG Apple Mac OSX 10.14 v2r6Unix

IDENTIFICATION AND AUTHENTICATION, MAINTENANCE

APPL-12-001100 - The macOS system must require individuals to be authenticated with an individual authenticator prior to using a group authenticator.DISA STIG Apple macOS 12 v1r9Unix

IDENTIFICATION AND AUTHENTICATION

CASA-ND-000470 - The Cisco ASA must be configured to implement replay-resistant authentication mechanisms for network access to privileged accounts - fips enabledDISA STIG Cisco ASA NDM v2r1Cisco

IDENTIFICATION AND AUTHENTICATION

CASA-ND-000470 - The Cisco ASA must be configured to implement replay-resistant authentication mechanisms for network access to privileged accounts - ssh key-exchangeDISA STIG Cisco ASA NDM v2r1Cisco

IDENTIFICATION AND AUTHENTICATION

CASA-VN-000440 - The Cisco ASA remote access VPN server must be configured to enforce certificate-based authentication before granting access to the network.DISA STIG Cisco ASA VPN v2r1Cisco

IDENTIFICATION AND AUTHENTICATION

EDGE-00-000062 - The built-in DNS client must be disabled.DISA STIG Edge v2r1Windows

IDENTIFICATION AND AUTHENTICATION

ESXI-70-000039 - Active Directory ESX Admin group membership must not be used when adding ESXi hosts to Active Directory.DISA STIG VMware vSphere 7.0 ESXi v1r2VMware

IDENTIFICATION AND AUTHENTICATION

GOOG-12-007200 - Google Android 12 must be configured to disable trust agents.AirWatch - DISA Google Android 12 COBO v1r2MDM

IDENTIFICATION AND AUTHENTICATION

GOOG-13-007200 - Google Android 13 must be configured to disable trust agents - NOTE: This requirement is not applicable (NA) for specific biometric authentication factors included in the product's Common Criteria evaluation.MobileIron - DISA Google Android 13 COBO v2r1MDM

IDENTIFICATION AND AUTHENTICATION

GOOG-13-007200 - Google Android 13 must be configured to disable trust agents - NOTE: This requirement is not applicable (NA) for specific biometric authentication factors included in the product's Common Criteria evaluation.AirWatch - DISA Google Android 13 COPE v2r1MDM

IDENTIFICATION AND AUTHENTICATION

GOOG-13-707200 - Google Android 13 must be configured to disable trust agents - NOTE: This requirement is not applicable (NA) for specific biometric authentication factors included in the product's Common Criteria evaluation.AirWatch - DISA Google Android 13 BYOD v1r2MDM

IDENTIFICATION AND AUTHENTICATION

GOOG-14-007200 - Google Android 14 must be configured to disable trust agents - NOTE: This requirement is not applicable (NA) for specific biometric authentication factors included in the product's Common Criteria evaluation.MobileIron - DISA Google Android 14 COBO v2r1MDM

IDENTIFICATION AND AUTHENTICATION

GOOG-14-007200 - Google Android 14 must be configured to disable trust agents - NOTE: This requirement is not applicable (NA) for specific biometric authentication factors included in the product's Common Criteria evaluation.AirWatch - DISA Google Android 14 COPE v2r1MDM

IDENTIFICATION AND AUTHENTICATION

JUEX-NM-000260 - The Juniper EX switch must be configured to implement replay-resistant authentication mechanisms for network access to privileged accounts.DISA Juniper EX Series Network Device Management v2r1Juniper

IDENTIFICATION AND AUTHENTICATION

JUEX-NM-000910 - The Juniper EX switch must change credentials for account of last resort when administrators who know the credential leave the organization.DISA Juniper EX Series Network Device Management v2r1Juniper

IDENTIFICATION AND AUTHENTICATION

MADB-10-003600 - MariaDB must uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).DISA MariaDB Enterprise 10.x v2r1 DBMySQLDB

IDENTIFICATION AND AUTHENTICATION

MD4X-00-002800 - MongoDB must uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).DISA STIG MongoDB Enterprise Advanced 4.x v1r4 OSUnix

IDENTIFICATION AND AUTHENTICATION

MYS8-00-006100 - The MySQL Database Server 8.0 must uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).DISA Oracle MySQL 8.0 v2r2 DBMySQLDB

IDENTIFICATION AND AUTHENTICATION

PHTN-30-000033 - The Photon operating system must not have duplicate User IDs (UIDs).DISA STIG VMware vSphere 7.0 Photon OS v1r3Unix

IDENTIFICATION AND AUTHENTICATION

PHTN-40-000049 The Photon operating system must not have duplicate User IDs (UIDs).DISA VMware vSphere 8.0 vCenter Appliance Photon OS 4.0 STIG v2r1Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-08-020240 - RHEL 8 duplicate User IDs (UIDs) must not exist for interactive users.DISA Red Hat Enterprise Linux 8 STIG v2r1Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-08-020250 - RHEL 8 must implement smart card logon for multifactor authentication for access to interactive accounts.DISA Red Hat Enterprise Linux 8 STIG v2r1Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-09-411045 - All RHEL 9 interactive users must have a primary group that exists.DISA Red Hat Enterprise Linux 9 STIG v2r2Unix

IDENTIFICATION AND AUTHENTICATION

SHPT-00-000530 - The Central Administration Web Application must use Kerberos as the authentication provider.DISA STIG SharePoint 2010 v1r9Windows

IDENTIFICATION AND AUTHENTICATION

SPLK-CL-000320 - Splunk Enterprise must use organization-level authentication to uniquely identify and authenticate users.DISA STIG Splunk Enterprise 8.x for Linux v2r1 STIG REST APISplunk

IDENTIFICATION AND AUTHENTICATION

SPLK-CL-000330 - Splunk Enterprise must use HTTPS/SSL for access to the user interface.DISA STIG Splunk Enterprise 8.x for Linux v2r1 STIG REST APISplunk

IDENTIFICATION AND AUTHENTICATION

SYMP-AG-000320 - Symantec ProxySG must uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users) - Domain JoinedDISA Symantec ProxySG Benchmark ALG v1r3BlueCoat

IDENTIFICATION AND AUTHENTICATION

SYMP-AG-000340 - Symantec ProxySG providing user authentication intermediary services must restrict user authentication traffic to specific authentication servers - Domain joinedDISA Symantec ProxySG Benchmark ALG v1r3BlueCoat

IDENTIFICATION AND AUTHENTICATION

SYMP-AG-000360 - Symantec ProxySG providing user authentication intermediary services must implement multifactor authentication for remote access to privileged accounts such that one of the factors is provided by a device separate from the system gaining access.DISA Symantec ProxySG Benchmark ALG v1r3BlueCoat

IDENTIFICATION AND AUTHENTICATION

VCPG-67-000012 - VMware Postgres must require authentication on all connections.DISA STIG VMware vSphere 6.7 PostgreSQL v1r2Unix

IDENTIFICATION AND AUTHENTICATION

VCTR-67-000010 - The vCenter Server must limit the use of the built-in SSO administrative account.DISA STIG VMware vSphere 6.7 vCenter v1r4VMware

IDENTIFICATION AND AUTHENTICATION

WBSP-AS-001010 - The WebSphere Application Server LDAP user registry must be used.DISA IBM WebSphere Traditional 9 STIG v1r1 MiddlewareUnix

IDENTIFICATION AND AUTHENTICATION

WBSP-AS-001030 - The WebSphere Application Server multifactor authentication for network access to privileged accounts must be used.DISA IBM WebSphere Traditional 9 STIG v1r1 MiddlewareUnix

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

WBSP-AS-001030 - The WebSphere Application Server multifactor authentication for network access to privileged accounts must be used.DISA IBM WebSphere Traditional 9 STIG v1r1Unix

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

WBSP-AS-001030 - The WebSphere Application Server multifactor authentication for network access to privileged accounts must be used.DISA IBM WebSphere Traditional 9 Windows STIG v1r1Windows

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

WBSP-AS-001080 - The WebSphere Application Server must provide security extensions to extend SOAP protocol and provide secure authenticationDISA IBM WebSphere Traditional 9 Windows STIG v1r1Windows

IDENTIFICATION AND AUTHENTICATION

WBSP-AS-001090 - The WebSphere Application Server must provide security extensions to extend SOAP protocol and provide secure authenticationDISA IBM WebSphere Traditional 9 STIG v1r1Unix

IDENTIFICATION AND AUTHENTICATION

WN11-SO-000005 - The built-in administrator account must be disabled.DISA Windows 11 STIG v2r2Windows

IDENTIFICATION AND AUTHENTICATION

WN22-00-000070 - Windows Server 2022 shared user accounts must not be permitted.DISA Windows Server 2022 STIG v2r2Windows

IDENTIFICATION AND AUTHENTICATION

WN22-DC-000020 - Windows Server 2022 Kerberos user logon restrictions must be enforced.DISA Windows Server 2022 STIG v2r2Windows

IDENTIFICATION AND AUTHENTICATION