Item Search

NameAudit NamePluginCategory
APPL-14-003007 - The macOS system must require passwords contain a minimum of one numeric character.DISA Apple macOS 14 (Sonoma) STIG v2r2Unix

IDENTIFICATION AND AUTHENTICATION

APPL-14-003010 - The macOS system must require a minimum password length of 14 characters.DISA Apple macOS 14 (Sonoma) STIG v2r2Unix

IDENTIFICATION AND AUTHENTICATION

APPL-14-003011 - The macOS system must require passwords contain a minimum of one special character.DISA Apple macOS 14 (Sonoma) STIG v2r2Unix

IDENTIFICATION AND AUTHENTICATION

CISC-ND-000550 - The Cisco router must be configured to enforce a minimum 15-character password length.DISA STIG Cisco IOS Router NDM v3r2Cisco

IDENTIFICATION AND AUTHENTICATION

CISC-ND-000550 - The Cisco switch must be configured to enforce a minimum 15-character password length.DISA STIG Cisco IOS XE Switch NDM v3r2Cisco

IDENTIFICATION AND AUTHENTICATION

CISC-ND-000570 - The Cisco switch must be configured to enforce password complexity by requiring that at least one uppercase character be used.DISA STIG Cisco IOS XE Switch NDM v3r2Cisco

IDENTIFICATION AND AUTHENTICATION

CISC-ND-000580 - The Cisco switch must be configured to enforce password complexity by requiring that at least one lowercase character be used.DISA STIG Cisco IOS XE Switch NDM v3r2Cisco

IDENTIFICATION AND AUTHENTICATION

CISC-ND-000590 - The Cisco switch must be configured to enforce password complexity by requiring that at least one numeric character be used.DISA STIG Cisco IOS XE Switch NDM v3r2Cisco

IDENTIFICATION AND AUTHENTICATION

CISC-ND-000600 - The Cisco router must be configured to enforce password complexity by requiring that at least one special character be used.DISA STIG Cisco IOS Router NDM v3r2Cisco

IDENTIFICATION AND AUTHENTICATION

CISC-ND-000600 - The Cisco switch must be configured to enforce password complexity by requiring that at least one special character be used.DISA STIG Cisco IOS XE Switch NDM v3r2Cisco

IDENTIFICATION AND AUTHENTICATION

CISC-ND-000610 - The Cisco router must be configured to require that when a password is changed, the characters are changed in at least eight of the positions within the password.DISA STIG Cisco IOS Router NDM v3r2Cisco

IDENTIFICATION AND AUTHENTICATION

CISC-ND-000610 - The Cisco switch must be configured to require that when a password is changed, the characters are changed in at least eight of the positions within the password.DISA STIG Cisco IOS XE Switch NDM v3r2Cisco

IDENTIFICATION AND AUTHENTICATION

JUNI-ND-000550 - The Juniper router must be configured to enforce a minimum 15-character password length.DISA STIG Juniper Router NDM v3r1Juniper

IDENTIFICATION AND AUTHENTICATION

JUNI-ND-000570 - The Juniper router must be configured to enforce password complexity by requiring that at least one uppercase character be used.DISA STIG Juniper Router NDM v3r1Juniper

IDENTIFICATION AND AUTHENTICATION

JUNI-ND-000580 - The Juniper router must be configured to enforce password complexity by requiring that at least one lowercase character be used.DISA STIG Juniper Router NDM v3r1Juniper

IDENTIFICATION AND AUTHENTICATION

JUNI-ND-000590 - The Juniper router must be configured to enforce password complexity by requiring that at least one numeric character be used.DISA STIG Juniper Router NDM v3r1Juniper

IDENTIFICATION AND AUTHENTICATION

JUNI-ND-000600 - The Juniper router must be configured to enforce password complexity by requiring that at least one special character be used.DISA STIG Juniper Router NDM v3r1Juniper

IDENTIFICATION AND AUTHENTICATION

O121-C2-013900 - The DBMS must support organizational requirements to enforce minimum password length.DISA STIG Oracle 12c v3r1 DatabaseOracleDB

IDENTIFICATION AND AUTHENTICATION

O121-C2-014100 - The DBMS must support organizational requirements to enforce password complexity by the number of uppercase characters used.DISA STIG Oracle 12c v3r1 DatabaseOracleDB

IDENTIFICATION AND AUTHENTICATION

O121-C2-014200 - The DBMS must support organizational requirements to enforce password complexity by the number of lowercase characters used.DISA STIG Oracle 12c v3r1 DatabaseOracleDB

IDENTIFICATION AND AUTHENTICATION

O121-C2-014300 - The DBMS must support organizational requirements to enforce password complexity by the number of numeric characters used.DISA STIG Oracle 12c v3r1 DatabaseOracleDB

IDENTIFICATION AND AUTHENTICATION

O121-C2-014400 - The DBMS must support organizational requirements to enforce password complexity by the number of special characters used.DISA STIG Oracle 12c v3r1 DatabaseOracleDB

IDENTIFICATION AND AUTHENTICATION

O121-C2-014500 - The DBMS must support organizational requirements to enforce the number of characters that get changed when passwords are changed.DISA STIG Oracle 12c v3r1 DatabaseOracleDB

IDENTIFICATION AND AUTHENTICATION

O121-C2-014900 - Procedures for establishing temporary passwords that meet DOD password requirements for new accounts must be defined, documented, and implemented.DISA STIG Oracle 12c v3r1 DatabaseOracleDB

IDENTIFICATION AND AUTHENTICATION

O121-C2-015200 - The DBMS must enforce password maximum lifetime restrictions.DISA STIG Oracle 12c v3r1 DatabaseOracleDB

IDENTIFICATION AND AUTHENTICATION

OL08-00-020110 - OL 8 must enforce password complexity by requiring that at least one uppercase character be used.DISA Oracle Linux 8 STIG v2r2Unix

IDENTIFICATION AND AUTHENTICATION

SOL-11.1-040010 - User passwords must be changed at least every 60 days.DISA STIG Solaris 11 X86 v3r1Unix

IDENTIFICATION AND AUTHENTICATION

SOL-11.1-040010 - User passwords must be changed at least every 60 days.DISA STIG Solaris 11 SPARC v3r1Unix

IDENTIFICATION AND AUTHENTICATION

SOL-11.1-040030 - The operating system must enforce minimum password lifetime restrictions.DISA STIG Solaris 11 X86 v3r1Unix

IDENTIFICATION AND AUTHENTICATION

SOL-11.1-040030 - The operating system must enforce minimum password lifetime restrictions.DISA STIG Solaris 11 SPARC v3r1Unix

IDENTIFICATION AND AUTHENTICATION

SOL-11.1-040040 - User passwords must be at least 15 characters in length.DISA STIG Solaris 11 X86 v3r1Unix

IDENTIFICATION AND AUTHENTICATION

SOL-11.1-040040 - User passwords must be at least 15 characters in length.DISA STIG Solaris 11 SPARC v3r1Unix

IDENTIFICATION AND AUTHENTICATION

SOL-11.1-040060 - The system must require at least eight characters be changed between the old and new passwords during a password change.DISA STIG Solaris 11 SPARC v3r1Unix

IDENTIFICATION AND AUTHENTICATION

SOL-11.1-040060 - The system must require at least eight characters be changed between the old and new passwords during a password change.DISA STIG Solaris 11 X86 v3r1Unix

IDENTIFICATION AND AUTHENTICATION

SOL-11.1-040070 - The system must require passwords to contain at least one uppercase alphabetic character.DISA STIG Solaris 11 SPARC v3r1Unix

IDENTIFICATION AND AUTHENTICATION

SOL-11.1-040070 - The system must require passwords to contain at least one uppercase alphabetic character.DISA STIG Solaris 11 X86 v3r1Unix

IDENTIFICATION AND AUTHENTICATION

SOL-11.1-040080 - The operating system must enforce password complexity requiring that at least one lowercase character is used.DISA STIG Solaris 11 X86 v3r1Unix

IDENTIFICATION AND AUTHENTICATION

SOL-11.1-040080 - The operating system must enforce password complexity requiring that at least one lowercase character is used.DISA STIG Solaris 11 SPARC v3r1Unix

IDENTIFICATION AND AUTHENTICATION

SOL-11.1-040090 - The system must require passwords to contain at least one numeric character.DISA STIG Solaris 11 X86 v3r1Unix

IDENTIFICATION AND AUTHENTICATION

SOL-11.1-040090 - The system must require passwords to contain at least one numeric character.DISA STIG Solaris 11 SPARC v3r1Unix

IDENTIFICATION AND AUTHENTICATION

SOL-11.1-040100 - The system must require passwords to contain at least one special character.DISA STIG Solaris 11 SPARC v3r1Unix

IDENTIFICATION AND AUTHENTICATION

SOL-11.1-040100 - The system must require passwords to contain at least one special character.DISA STIG Solaris 11 X86 v3r1Unix

IDENTIFICATION AND AUTHENTICATION

SPLK-CL-000330 - Splunk Enterprise must enforce password complexity for the account of last resort by requiring that at least one uppercase character be used.DISA STIG Splunk Enterprise 7.x for Windows v3r1 REST APISplunk

IDENTIFICATION AND AUTHENTICATION

SPLK-CL-000340 - Splunk Enterprise must enforce password complexity for the account of last resort by requiring that at least one lowercase character be used.DISA STIG Splunk Enterprise 7.x for Windows v3r1 REST APISplunk

IDENTIFICATION AND AUTHENTICATION

SPLK-CL-000350 - Splunk Enterprise must enforce password complexity for the account of last resort by requiring that at least one numeric character be used.DISA STIG Splunk Enterprise 7.x for Windows v3r1 REST APISplunk

IDENTIFICATION AND AUTHENTICATION

SPLK-CL-000360 - Splunk Enterprise must enforce a minimum 15-character password length for the account of last resort.DISA STIG Splunk Enterprise 7.x for Windows v3r1 REST APISplunk

IDENTIFICATION AND AUTHENTICATION

SPLK-CL-000370 - Splunk Enterprise must enforce password complexity for the account of last resort by requiring that at least one special character be used.DISA STIG Splunk Enterprise 7.x for Windows v3r1 REST APISplunk

IDENTIFICATION AND AUTHENTICATION

SPLK-CL-000380 - Splunk Enterprise must enforce a 60-day maximum password lifetime restriction for the account of last resort.DISA STIG Splunk Enterprise 7.x for Windows v3r1 REST APISplunk

IDENTIFICATION AND AUTHENTICATION

SQL6-D0-007900 - If DBMS authentication using passwords is employed, SQL Server must enforce the DOD standards for password complexity and lifetime.DISA STIG SQL Server 2016 Instance DB Audit v3r1MS_SQLDB

IDENTIFICATION AND AUTHENTICATION

SQL6-D0-008000 - Contained databases must use Windows principals.DISA STIG SQL Server 2016 Instance DB Audit v3r1MS_SQLDB

IDENTIFICATION AND AUTHENTICATION