Item Search

NameAudit NamePluginCategory
APPL-14-003007 The macOS system must require passwords contain a minimum of one numeric character.DISA Apple macOS 14 (Sonoma) STIG v2r3Unix

IDENTIFICATION AND AUTHENTICATION

APPL-14-003010 The macOS system must require a minimum password length of 14 characters.DISA Apple macOS 14 (Sonoma) STIG v2r3Unix

IDENTIFICATION AND AUTHENTICATION

APPL-14-003011 The macOS system must require passwords contain a minimum of one special character.DISA Apple macOS 14 (Sonoma) STIG v2r3Unix

IDENTIFICATION AND AUTHENTICATION

APPL-15-003060 - The macOS system must require that passwords contain a minimum of one lowercase character and one uppercase character.DISA Apple macOS 15 (Sequoia) STIG v1r2Unix

IDENTIFICATION AND AUTHENTICATION

CASA-ND-000580 - The Cisco ASA must be configured to require that when a password is changed, the characters are changed in at least eight of the positions within the password.DISA STIG Cisco ASA NDM v2r2Cisco

IDENTIFICATION AND AUTHENTICATION

CISC-ND-000570 - The Cisco switch must be configured to enforce password complexity by requiring that at least one uppercase character be used.DISA STIG Cisco IOS XE Switch NDM v3r2Cisco

IDENTIFICATION AND AUTHENTICATION

CISC-ND-000590 - The Cisco switch must be configured to enforce password complexity by requiring that at least one numeric character be used.DISA STIG Cisco IOS XE Switch NDM v3r2Cisco

IDENTIFICATION AND AUTHENTICATION

CISC-ND-000600 - The Cisco router must be configured to enforce password complexity by requiring that at least one special character be used.DISA STIG Cisco IOS Router NDM v3r2Cisco

IDENTIFICATION AND AUTHENTICATION

CISC-ND-000600 - The Cisco switch must be configured to enforce password complexity by requiring that at least one special character be used.DISA STIG Cisco IOS XE Switch NDM v3r2Cisco

IDENTIFICATION AND AUTHENTICATION

CISC-ND-000610 - The Cisco router must be configured to require that when a password is changed, the characters are changed in at least eight of the positions within the password.DISA STIG Cisco IOS Router NDM v3r2Cisco

IDENTIFICATION AND AUTHENTICATION

CISC-ND-000610 - The Cisco switch must be configured to require that when a password is changed, the characters are changed in at least eight of the positions within the password.DISA STIG Cisco IOS XE Switch NDM v3r2Cisco

IDENTIFICATION AND AUTHENTICATION

JUEX-NM-000310 - The Juniper EX switch must be configured to enforce password complexity by requiring that at least one punctuation (special) character be used.DISA Juniper EX Series Network Device Management v2r2Juniper

IDENTIFICATION AND AUTHENTICATION

JUNI-ND-000570 - The Juniper router must be configured to enforce password complexity by requiring that at least one uppercase character be used.DISA STIG Juniper Router NDM v3r1Juniper

IDENTIFICATION AND AUTHENTICATION

JUNI-ND-000590 - The Juniper router must be configured to enforce password complexity by requiring that at least one numeric character be used.DISA STIG Juniper Router NDM v3r1Juniper

IDENTIFICATION AND AUTHENTICATION

OL08-00-020110 - OL 8 must enforce password complexity by requiring that at least one uppercase character be used.DISA Oracle Linux 8 STIG v2r2Unix

IDENTIFICATION AND AUTHENTICATION

OL08-00-020120 - OL 8 must enforce password complexity by requiring that at least one lowercase character be used.DISA Oracle Linux 8 STIG v2r2Unix

IDENTIFICATION AND AUTHENTICATION

OL08-00-020150 - OL 8 must require the maximum number of repeating characters be limited to three when passwords are changed.DISA Oracle Linux 8 STIG v2r2Unix

IDENTIFICATION AND AUTHENTICATION

OL08-00-020190 - OL 8 passwords for new users or password changes must have a 24 hours/one day minimum password lifetime restriction in '/etc/login.defs'.DISA Oracle Linux 8 STIG v2r2Unix

IDENTIFICATION AND AUTHENTICATION

OL08-00-020200 - OL 8 user account passwords must have a 60-day maximum password lifetime restriction.DISA Oracle Linux 8 STIG v2r2Unix

IDENTIFICATION AND AUTHENTICATION

OL08-00-020210 - OL 8 user account passwords must be configured so that existing passwords are restricted to a 60-day maximum lifetime.DISA Oracle Linux 8 STIG v2r2Unix

IDENTIFICATION AND AUTHENTICATION

OL08-00-020231 - OL 8 passwords for new users must have a minimum of 15 characters.DISA Oracle Linux 8 STIG v2r2Unix

IDENTIFICATION AND AUTHENTICATION

OL08-00-020280 - All OL 8 passwords must contain at least one special character.DISA Oracle Linux 8 STIG v2r2Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-08-020140 - RHEL 8 must require the maximum number of repeating characters of the same character class be limited to four when passwords are changed.DISA Red Hat Enterprise Linux 8 STIG v2r1Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-08-020210 - RHEL 8 user account passwords must be configured so that existing passwords are restricted to a 60-day maximum lifetime.DISA Red Hat Enterprise Linux 8 STIG v2r1Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-08-020231 - RHEL 8 passwords for new users must have a minimum of 15 characters.DISA Red Hat Enterprise Linux 8 STIG v2r1Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-09-611040 - RHEL 9 must ensure the password complexity module is enabled in the password-auth file.DISA Red Hat Enterprise Linux 9 STIG v2r3Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-09-611070 - RHEL 9 must enforce password complexity by requiring that at least one numeric character be used.DISA Red Hat Enterprise Linux 9 STIG v2r3Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-09-611080 - RHEL 9 passwords must have a 24 hours minimum password lifetime restriction in /etc/shadow.DISA Red Hat Enterprise Linux 9 STIG v2r3Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-09-611100 - RHEL 9 must enforce password complexity by requiring that at least one special character be used.DISA Red Hat Enterprise Linux 9 STIG v2r3Unix

IDENTIFICATION AND AUTHENTICATION

SOL-11.1-040010 - User passwords must be changed at least every 60 days.DISA STIG Solaris 11 X86 v3r1Unix

IDENTIFICATION AND AUTHENTICATION

SOL-11.1-040010 - User passwords must be changed at least every 60 days.DISA STIG Solaris 11 SPARC v3r1Unix

IDENTIFICATION AND AUTHENTICATION

SOL-11.1-040030 - The operating system must enforce minimum password lifetime restrictions.DISA STIG Solaris 11 SPARC v3r1Unix

IDENTIFICATION AND AUTHENTICATION

SOL-11.1-040040 - User passwords must be at least 15 characters in length.DISA STIG Solaris 11 SPARC v3r1Unix

IDENTIFICATION AND AUTHENTICATION

SOL-11.1-040040 - User passwords must be at least 15 characters in length.DISA STIG Solaris 11 X86 v3r1Unix

IDENTIFICATION AND AUTHENTICATION

SOL-11.1-040060 - The system must require at least eight characters be changed between the old and new passwords during a password change.DISA STIG Solaris 11 X86 v3r1Unix

IDENTIFICATION AND AUTHENTICATION

SOL-11.1-040080 - The operating system must enforce password complexity requiring that at least one lowercase character is used.DISA STIG Solaris 11 X86 v3r1Unix

IDENTIFICATION AND AUTHENTICATION

SOL-11.1-040080 - The operating system must enforce password complexity requiring that at least one lowercase character is used.DISA STIG Solaris 11 SPARC v3r1Unix

IDENTIFICATION AND AUTHENTICATION

SOL-11.1-040090 - The system must require passwords to contain at least one numeric character.DISA STIG Solaris 11 SPARC v3r1Unix

IDENTIFICATION AND AUTHENTICATION

SOL-11.1-040100 - The system must require passwords to contain at least one special character.DISA STIG Solaris 11 SPARC v3r1Unix

IDENTIFICATION AND AUTHENTICATION

SPLK-CL-000330 - Splunk Enterprise must enforce password complexity for the account of last resort by requiring that at least one uppercase character be used.DISA STIG Splunk Enterprise 7.x for Windows v3r1 REST APISplunk

IDENTIFICATION AND AUTHENTICATION

SPLK-CL-000340 - Splunk Enterprise must enforce password complexity for the account of last resort by requiring that at least one lowercase character be used.DISA STIG Splunk Enterprise 7.x for Windows v3r1 REST APISplunk

IDENTIFICATION AND AUTHENTICATION

SPLK-CL-000370 - Splunk Enterprise must enforce password complexity for the account of last resort by requiring that at least one special character be used.DISA STIG Splunk Enterprise 7.x for Windows v3r1 REST APISplunk

IDENTIFICATION AND AUTHENTICATION

SPLK-CL-000380 - Splunk Enterprise must enforce a 60-day maximum password lifetime restriction for the account of last resort.DISA STIG Splunk Enterprise 7.x for Windows v3r1 REST APISplunk

IDENTIFICATION AND AUTHENTICATION

UBTU-22-611010 - Ubuntu 22.04 LTS must enforce password complexity by requiring at least one uppercase character be used.DISA Canonical Ubuntu 22.04 LTS STIG v2r3Unix

IDENTIFICATION AND AUTHENTICATION

UBTU-22-611025 - Ubuntu 22.04 LTS must enforce password complexity by requiring that at least one special character be used.DISA Canonical Ubuntu 22.04 LTS STIG v2r3Unix

IDENTIFICATION AND AUTHENTICATION

UBTU-24-400270 - Ubuntu 24.04 LTS must enforce password complexity by requiring that at least one lowercase character be used.DISA Canonical Ubuntu 24.04 LTS STIG v1r1Unix

IDENTIFICATION AND AUTHENTICATION

UBTU-24-400280 - Ubuntu 24.04 LTS must enforce password complexity by requiring that at least one numeric character be used.DISA Canonical Ubuntu 24.04 LTS STIG v1r1Unix

IDENTIFICATION AND AUTHENTICATION

UBTU-24-400330 - Ubuntu 24.04 LTS must enforce password complexity by requiring that at least one special character be used.DISA Canonical Ubuntu 24.04 LTS STIG v1r1Unix

IDENTIFICATION AND AUTHENTICATION

WN11-AC-000025 - The maximum password age must be configured to 60 days or less.DISA Windows 11 STIG v2r2Windows

IDENTIFICATION AND AUTHENTICATION

WN22-00-000020 - Windows Server 2022 passwords for the built-in Administrator account must be changed at least every 60 days.DISA Microsoft Windows Server 2022 STIG v2r3Windows

IDENTIFICATION AND AUTHENTICATION