Item Search

NameAudit NamePluginCategory
1.175 OL08-00-020150CIS Oracle Linux 8 STIG v1.0.0 CAT IIUnix

IDENTIFICATION AND AUTHENTICATION

1.176 OL08-00-020160CIS Oracle Linux 8 STIG v1.0.0 CAT IIUnix

IDENTIFICATION AND AUTHENTICATION

1.179 OL08-00-020190CIS Oracle Linux 8 STIG v1.0.0 CAT IIUnix

IDENTIFICATION AND AUTHENTICATION

1.182 OL08-00-020230CIS Oracle Linux 8 STIG v1.0.0 CAT IIUnix

IDENTIFICATION AND AUTHENTICATION

AIOS-17-006500 - Apple iOS/iPadOS 17 must be configured to enforce a minimum password length of six characters.AirWatch - DISA Apple iOS/iPadOS 17 v2r2MDM

IDENTIFICATION AND AUTHENTICATION

AIOS-17-006600 - Apple iOS/iPadOS 17 must be configured to not allow passwords that include more than four repeating or sequential characters.AirWatch - DISA Apple iOS/iPadOS 17 v2r2MDM

IDENTIFICATION AND AUTHENTICATION

AIOS-17-006600 - Apple iOS/iPadOS 17 must be configured to not allow passwords that include more than four repeating or sequential characters.MobileIron - DISA Apple iOS/iPadOS 17 v2r2MDM

IDENTIFICATION AND AUTHENTICATION

APPL-14-003070 The macOS system must set minimum password lifetime to 24 hours.DISA Apple macOS 14 (Sonoma) STIG v2r3Unix

IDENTIFICATION AND AUTHENTICATION

APPL-15-003060 - The macOS system must require that passwords contain a minimum of one lowercase character and one uppercase character.DISA Apple macOS 15 (Sequoia) STIG v1r4Unix

IDENTIFICATION AND AUTHENTICATION

ARST-ND-000380 - The Arista network device must enforce a minimum 15-character password length.DISA STIG Arista MLS EOS 4.x NDM v2r2Arista

IDENTIFICATION AND AUTHENTICATION

CASA-ND-000490 - The Cisco ASA must be configured to enforce a minimum 15-character password length.DISA STIG Cisco ASA NDM v2r2Cisco

IDENTIFICATION AND AUTHENTICATION

CASA-ND-000530 - The Cisco ASA must be configured to enforce password complexity by requiring that at least one lowercase character be used.DISA STIG Cisco ASA NDM v2r2Cisco

IDENTIFICATION AND AUTHENTICATION

CASA-ND-000550 - The Cisco ASA must be configured to enforce password complexity by requiring that at least one numeric character be used.DISA STIG Cisco ASA NDM v2r2Cisco

IDENTIFICATION AND AUTHENTICATION

CASA-ND-000580 - The Cisco ASA must be configured to require that when a password is changed, the characters are changed in at least eight of the positions within the password.DISA STIG Cisco ASA NDM v2r2Cisco

IDENTIFICATION AND AUTHENTICATION

GOOG-13-006000 - Google Android 13 must be configured to enforce a minimum password length of six characters.AirWatch - DISA Google Android 13 COPE v2r2MDM

IDENTIFICATION AND AUTHENTICATION

GOOG-13-006000 - Google Android 13 must be configured to enforce a minimum password length of six characters.MobileIron - DISA Google Android 13 COPE v2r2MDM

IDENTIFICATION AND AUTHENTICATION

JUEX-NM-000300 - The Juniper EX switch must be configured to enforce password complexity by requiring that at least one numeric character be used.DISA Juniper EX Series Network Device Management v2r3Juniper

IDENTIFICATION AND AUTHENTICATION

JUEX-NM-000310 - The Juniper EX switch must be configured to enforce password complexity by requiring that at least one punctuation (special) character be used.DISA Juniper EX Series Network Device Management v2r3Juniper

IDENTIFICATION AND AUTHENTICATION

MYS8-00-005000 - If Database Management System (DBMS) authentication using passwords is employed, the DBMS must enforce the DOD standards for password complexity and lifetime - DBMS authentication using passwords is employed, the DBMS must enforce the DoD standards for password complexity and lifetime.DISA Oracle MySQL 8.0 v2r2 DBMySQLDB

IDENTIFICATION AND AUTHENTICATION

OL08-00-020150 - OL 8 must require the maximum number of repeating characters be limited to three when passwords are changed.DISA Oracle Linux 8 STIG v2r5Unix

IDENTIFICATION AND AUTHENTICATION

OL08-00-020180 - OL 8 passwords for new users or password changes must have a 24 hours/one day minimum password lifetime restriction in "/etc/shadow".DISA Oracle Linux 8 STIG v2r5Unix

IDENTIFICATION AND AUTHENTICATION

OL08-00-020210 - OL 8 user account passwords must be configured so that existing passwords are restricted to a 60-day maximum lifetime.DISA Oracle Linux 8 STIG v2r5Unix

IDENTIFICATION AND AUTHENTICATION

OL08-00-020231 - OL 8 passwords for new users must have a minimum of 15 characters.DISA Oracle Linux 8 STIG v2r5Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-08-020110 - RHEL 8 must enforce password complexity by requiring that at least one uppercase character be used.DISA Red Hat Enterprise Linux 8 STIG v2r4Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-08-020130 - RHEL 8 must enforce password complexity by requiring that at least one numeric character be used.DISA Red Hat Enterprise Linux 8 STIG v2r4Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-08-020170 - RHEL 8 must require the change of at least 8 characters when passwords are changed.DISA Red Hat Enterprise Linux 8 STIG v2r4Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-08-020190 - RHEL 8 passwords for new users or password changes must have a 24 hours/1 day minimum password lifetime restriction in /etc/login.defs.DISA Red Hat Enterprise Linux 8 STIG v2r4Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-08-020231 - RHEL 8 passwords for new users must have a minimum of 15 characters.DISA Red Hat Enterprise Linux 8 STIG v2r4Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-08-020280 - All RHEL 8 passwords must contain at least one special character.DISA Red Hat Enterprise Linux 8 STIG v2r4Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-09-411010 - RHEL 9 user account passwords for new users or password changes must have a 60-day maximum password lifetime restriction in /etc/login.defs.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-09-611010 - RHEL 9 must ensure the password complexity module in the system-auth file is configured for three retries or less.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-09-611075 - RHEL 9 passwords for new users or password changes must have a 24 hours minimum password lifetime restriction in /etc/login.defs.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-09-611110 - RHEL 9 must enforce password complexity by requiring that at least one uppercase character be used.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-09-611130 - RHEL 9 must require the change of at least four character classes when passwords are changed.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

IDENTIFICATION AND AUTHENTICATION

SLES-15-020130 - The SUSE operating system must enforce passwords that contain at least one uppercase character.DISA SUSE Linux Enterprise Server 15 STIG v2r5Unix

IDENTIFICATION AND AUTHENTICATION

SLES-15-020150 - The SUSE operating system must enforce passwords that contain at least one numeric character.DISA SUSE Linux Enterprise Server 15 STIG v2r5Unix

IDENTIFICATION AND AUTHENTICATION

SLES-15-020210 - The SUSE operating system must employ user passwords with a minimum lifetime of 24 hours (one day).DISA SUSE Linux Enterprise Server 15 STIG v2r5Unix

IDENTIFICATION AND AUTHENTICATION

SPLK-CL-000360 - Splunk Enterprise must be configured to enforce password complexity by requiring that at least one numeric character be used.DISA STIG Splunk Enterprise 8.x for Linux v2r2 STIG OSUnix

IDENTIFICATION AND AUTHENTICATION

SPLK-CL-000380 - Splunk Enterprise must be configured to enforce password complexity by requiring that at least one special character be used.DISA STIG Splunk Enterprise 8.x for Linux v2r2 STIG OSUnix

IDENTIFICATION AND AUTHENTICATION

UBTU-20-010051 - The Ubuntu operating system must enforce password complexity by requiring that at least one lower-case character be used.DISA Canonical Ubuntu 20.04 LTS STIG v2r3Unix

IDENTIFICATION AND AUTHENTICATION

UBTU-20-010052 - The Ubuntu operating system must enforce password complexity by requiring that at least one numeric character be used.DISA Canonical Ubuntu 20.04 LTS STIG v2r3Unix

IDENTIFICATION AND AUTHENTICATION

UBTU-20-010055 - The Ubuntu operating system must enforce password complexity by requiring that at least one special character be used.DISA Canonical Ubuntu 20.04 LTS STIG v2r3Unix

IDENTIFICATION AND AUTHENTICATION

UBTU-24-400270 - Ubuntu 24.04 LTS must enforce password complexity by requiring that at least one lowercase character be used.DISA Canonical Ubuntu 24.04 LTS STIG v1r2Unix

IDENTIFICATION AND AUTHENTICATION

UBTU-24-400300 - Ubuntu 24.04 LTS must enforce 24 hours/1 day as the minimum password lifetime. Passwords for new users must have a 24 hours/1 day minimum password lifetime restriction.DISA Canonical Ubuntu 24.04 LTS STIG v1r2Unix

IDENTIFICATION AND AUTHENTICATION

VCSA-80-000073 - The vCenter Server passwords must contain at least one numeric character.DISA VMware vSphere 8.0 vCenter STIG v2r3VMware

IDENTIFICATION AND AUTHENTICATION

WN22-00-000020 - Windows Server 2022 passwords for the built-in Administrator account must be changed at least every 60 days.DISA Microsoft Windows Server 2022 STIG v2r5Windows

IDENTIFICATION AND AUTHENTICATION

WN22-00-000050 - Windows Server 2022 manually managed application account passwords must be at least 14 characters in length.DISA Microsoft Windows Server 2022 STIG v2r5Windows

IDENTIFICATION AND AUTHENTICATION

WN22-00-000210 - Windows Server 2022 passwords must be configured to expire.DISA Microsoft Windows Server 2022 STIG v2r5Windows

IDENTIFICATION AND AUTHENTICATION

WN22-AC-000050 - Windows Server 2022 maximum password age must be configured to 60 days or less.DISA Microsoft Windows Server 2022 STIG v2r5Windows

IDENTIFICATION AND AUTHENTICATION

WN22-AC-000070 - Windows Server 2022 minimum password length must be configured to 14 characters.DISA Microsoft Windows Server 2022 STIG v2r5Windows

IDENTIFICATION AND AUTHENTICATION