3.2.12 Set archive log failover retry limit - 'numarchretry <= 5' | CIS IBM DB2 OS L2 v1.2.0 | Unix | CONFIGURATION MANAGEMENT |
5.3.3 Ensure password reuse is limited | CIS Debian 8 Server L1 v2.0.2 | Unix | CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
5.3.3 Ensure password reuse is limited | CIS Ubuntu Linux 18.04 LXD Host L1 Server v1.0.0 | Unix | ACCESS CONTROL |
5.3.3 Ensure password reuse is limited - system-auth | CIS Amazon Linux 2 STIG v1.0.0 L1 | Unix | IDENTIFICATION AND AUTHENTICATION |
5.3.3.1.1 Ensure password failed attempts lockout is configured | CIS Ubuntu Linux 24.04 LTS v1.0.0 L1 Server | Unix | ACCESS CONTROL |
5.3.3.1.1 Ensure password failed attempts lockout is configured | CIS Ubuntu Linux 24.04 LTS v1.0.0 L1 Workstation | Unix | ACCESS CONTROL |
5.3.3.1.1 Ensure password failed attempts lockout is configured | CIS Debian Linux 11 v2.0.0 L1 Server | Unix | ACCESS CONTROL |
5.4.3 Ensure password reuse is limited - password-auth | CIS Red Hat 6 Server L1 v3.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
5.4.3 Ensure password reuse is limited - system-auth | CIS Oracle Linux 6 Server L1 v2.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
5.4.3 Ensure password reuse is limited - system-auth | CIS Oracle Linux 6 Workstation L1 v2.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
5.4.3 Ensure password reuse is limited - system-auth | CIS Red Hat 6 Workstation L1 v3.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
6.1.1 Audit system file permissions | CIS Distribution Independent Linux Workstation L2 v2.0.0 | Unix | ACCESS CONTROL |
6.1.10 Audit system file permissions | CIS Amazon Linux 2023 Server L2 v1.0.0 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
Big Sur - Enforce Session Lock After Screen Saver is Started | NIST macOS Big Sur v1.4.0 - 800-53r4 Moderate | Unix | ACCESS CONTROL |
Big Sur - Enforce Session Lock After Screen Saver is Started | NIST macOS Big Sur v1.4.0 - All Profiles | Unix | ACCESS CONTROL |
Big Sur - Enforce Session Lock After Screen Saver is Started | NIST macOS Big Sur v1.4.0 - CNSSI 1253 | Unix | ACCESS CONTROL |
Big Sur - Enforce Session Lock After Screen Saver is Started | NIST macOS Big Sur v1.4.0 - 800-171 | Unix | ACCESS CONTROL |
Big Sur - Prohibit Password Reuse for a Minimum of Five Generations | NIST macOS Big Sur v1.4.0 - 800-171 | Unix | IDENTIFICATION AND AUTHENTICATION |
Big Sur - Prohibit Password Reuse for a Minimum of Five Generations | NIST macOS Big Sur v1.4.0 - 800-53r4 Low | Unix | IDENTIFICATION AND AUTHENTICATION |
Big Sur - Prohibit Password Reuse for a Minimum of Five Generations | NIST macOS Big Sur v1.4.0 - 800-53r5 Moderate | Unix | IDENTIFICATION AND AUTHENTICATION |
Big Sur - Prohibit Password Reuse for a Minimum of Five Generations | NIST macOS Big Sur v1.4.0 - CNSSI 1253 | Unix | IDENTIFICATION AND AUTHENTICATION |
BIND-9X-001620 - On a BIND 9.x server all root name servers listed in the local root zone file hosted on a BIND 9.x authoritative name server must be valid for that zone. | DISA BIND 9.x STIG v2r3 | Unix | CONFIGURATION MANAGEMENT |
Catalina - Enforce Session Lock After Screen Saver is Started | NIST macOS Catalina v1.5.0 - 800-171 | Unix | ACCESS CONTROL |
Catalina - Enforce Session Lock After Screen Saver is Started | NIST macOS Catalina v1.5.0 - 800-53r4 High | Unix | ACCESS CONTROL |
Catalina - Enforce Session Lock After Screen Saver is Started | NIST macOS Catalina v1.5.0 - 800-53r4 Moderate | Unix | ACCESS CONTROL |
Catalina - Enforce Session Lock After Screen Saver is Started | NIST macOS Catalina v1.5.0 - All Profiles | Unix | ACCESS CONTROL |
Catalina - Enforce Session Lock After Screen Saver is Started | NIST macOS Catalina v1.5.0 - CNSSI 1253 | Unix | ACCESS CONTROL |
Catalina - Prohibit Password Reuse for a Minimum of Five Generations | NIST macOS Catalina v1.5.0 - 800-53r4 Low | Unix | IDENTIFICATION AND AUTHENTICATION |
Catalina - Prohibit Password Reuse for a Minimum of Five Generations | NIST macOS Catalina v1.5.0 - 800-53r4 Moderate | Unix | IDENTIFICATION AND AUTHENTICATION |
Catalina - Prohibit Password Reuse for a Minimum of Five Generations | NIST macOS Catalina v1.5.0 - 800-171 | Unix | IDENTIFICATION AND AUTHENTICATION |
Catalina - Prohibit Password Reuse for a Minimum of Five Generations | NIST macOS Catalina v1.5.0 - 800-53r5 High | Unix | IDENTIFICATION AND AUTHENTICATION |
Catalina - Prohibit Password Reuse for a Minimum of Five Generations | NIST macOS Catalina v1.5.0 - All Profiles | Unix | IDENTIFICATION AND AUTHENTICATION |
CISC-RT-000260 - The Cisco perimeter router must be configured to only allow incoming communications from authorized sources to be routed to authorized destinations. | DISA STIG Cisco IOS Router RTR v3r2 | Cisco | SYSTEM AND COMMUNICATIONS PROTECTION |
CISC-RT-000530 - The Cisco BGP router must be configured to reject outbound route advertisements for any prefixes belonging to the IP core. | DISA STIG Cisco IOS Router RTR v3r2 | Cisco | SYSTEM AND COMMUNICATIONS PROTECTION |
CISC-RT-000530 - The Cisco BGP router must be configured to reject outbound route advertisements for any prefixes belonging to the IP core. | DISA STIG Cisco IOS XE Router RTR v3r2 | Cisco | SYSTEM AND COMMUNICATIONS PROTECTION |
CISC-RT-000530 - The Cisco BGP switch must be configured to reject outbound route advertisements for any prefixes belonging to the IP core. | DISA STIG Cisco IOS XE Switch RTR v3r1 | Cisco | SYSTEM AND COMMUNICATIONS PROTECTION |
GEN003800 - Inetd or xinetd logging/tracing must be enabled. | DISA STIG Solaris 10 SPARC v2r4 | Unix | AUDIT AND ACCOUNTABILITY |
Monterey - Enforce Session Lock After Screen Saver is Started | NIST macOS Monterey v1.0.0 - 800-53r4 High | Unix | ACCESS CONTROL |
Monterey - Enforce Session Lock After Screen Saver is Started | NIST macOS Monterey v1.0.0 - CNSSI 1253 | Unix | ACCESS CONTROL |
Monterey - Enforce Session Lock After Screen Saver is Started | NIST macOS Monterey v1.0.0 - 800-53r4 Moderate | Unix | ACCESS CONTROL |
Monterey - Prohibit Password Reuse for a Minimum of Five Generations | NIST macOS Monterey v1.0.0 - 800-53r5 Low | Unix | IDENTIFICATION AND AUTHENTICATION |
Monterey - Prohibit Password Reuse for a Minimum of Five Generations | NIST macOS Monterey v1.0.0 - 800-53r5 High | Unix | IDENTIFICATION AND AUTHENTICATION |
OH12-1X-000046 - OHS must have a SSL log format defined to generate adequate logs by system startup and shutdown, system access, and system authentication events. | DISA STIG Oracle HTTP Server 12.1.3 v2r2 | Unix | AUDIT AND ACCOUNTABILITY |
OH12-1X-000052 - OHS must have a SSL log format defined for log records generated to capture sufficient information to establish what type of events occurred. | DISA STIG Oracle HTTP Server 12.1.3 v2r2 | Unix | AUDIT AND ACCOUNTABILITY |
OH12-1X-000055 - OHS must have a SSL log format defined for log records generated to capture sufficient information to establish when an event occurred. | DISA STIG Oracle HTTP Server 12.1.3 v2r2 | Unix | AUDIT AND ACCOUNTABILITY |
OH12-1X-000058 - OHS must have a SSL log format defined for log records that allow the establishment of where within OHS the events occurred. | DISA STIG Oracle HTTP Server 12.1.3 v2r2 | Unix | AUDIT AND ACCOUNTABILITY |
OH12-1X-000061 - OHS must have a SSL log format defined for log records that allow the establishment of the source of events. | DISA STIG Oracle HTTP Server 12.1.3 v2r2 | Unix | AUDIT AND ACCOUNTABILITY |
OH12-1X-000067 - OHS must have a SSL log format defined to produce log records that contain sufficient information to establish the outcome (success or failure) of events. | DISA STIG Oracle HTTP Server 12.1.3 v2r2 | Unix | AUDIT AND ACCOUNTABILITY |
OL6-00-000274 - The system must prohibit the reuse of passwords within five iterations - password-auth | DISA STIG Oracle Linux 6 v2r7 | Unix | IDENTIFICATION AND AUTHENTICATION |
OL08-00-020040 - OL 8 must enable a user session lock until that user re-establishes access using established identification and authentication procedures for command line sessions. | DISA Oracle Linux 8 STIG v2r2 | Unix | ACCESS CONTROL |