Item Search

NameAudit NamePluginCategory
AIX7-00-001120 - AIX must enforce password complexity by requiring that at least one upper-case character be used.DISA STIG AIX 7.x v3r1Unix

IDENTIFICATION AND AUTHENTICATION

AIX7-00-001121 - AIX must enforce password complexity by requiring that at least one lower-case character be used.DISA STIG AIX 7.x v3r1Unix

IDENTIFICATION AND AUTHENTICATION

AIX7-00-001122 - AIX must enforce password complexity by requiring that at least one numeric character be used.DISA STIG AIX 7.x v3r1Unix

IDENTIFICATION AND AUTHENTICATION

AIX7-00-001123 - AIX must require the change of at least 50% of the total number of characters when passwords are changed.DISA STIG AIX 7.x v3r1Unix

IDENTIFICATION AND AUTHENTICATION

AIX7-00-001125 - AIX Operating systems must enforce 24 hours/1 day as the minimum password lifetime.DISA STIG AIX 7.x v3r1Unix

IDENTIFICATION AND AUTHENTICATION

AIX7-00-001126 - AIX Operating systems must enforce a 60-day maximum password lifetime restriction.DISA STIG AIX 7.x v3r1Unix

IDENTIFICATION AND AUTHENTICATION

AIX7-00-001128 - AIX must use Loadable Password Algorithm (LPA) password hashing algorithm.DISA STIG AIX 7.x v3r1Unix

IDENTIFICATION AND AUTHENTICATION

AIX7-00-001129 - AIX must enforce a minimum 15-character password length.DISA STIG AIX 7.x v3r1Unix

IDENTIFICATION AND AUTHENTICATION

AIX7-00-001130 - AIX must enforce password complexity by requiring that at least one special character be used.DISA STIG AIX 7.x v3r1Unix

IDENTIFICATION AND AUTHENTICATION

APPL-14-003060 - The macOS system must require passwords contain a minimum of one lowercase character and one uppercase character.DISA Apple macOS 14 (Sonoma) STIG v2r2Unix

IDENTIFICATION AND AUTHENTICATION

CISC-ND-000550 - The Cisco router must be configured to enforce a minimum 15-character password length.DISA STIG Cisco IOS XE Router NDM v3r2Cisco

IDENTIFICATION AND AUTHENTICATION

CISC-ND-000550 - The Cisco switch must be configured to enforce a minimum 15-character password length.DISA STIG Cisco IOS Switch NDM v3r2Cisco

IDENTIFICATION AND AUTHENTICATION

CISC-ND-000570 - The Cisco router must be configured to enforce password complexity by requiring that at least one uppercase character be used.DISA STIG Cisco IOS Router NDM v3r2Cisco

IDENTIFICATION AND AUTHENTICATION

CISC-ND-000570 - The Cisco router must be configured to enforce password complexity by requiring that at least one uppercase character be used.DISA STIG Cisco IOS XE Router NDM v3r2Cisco

IDENTIFICATION AND AUTHENTICATION

CISC-ND-000570 - The Cisco switch must be configured to enforce password complexity by requiring that at least one uppercase character be used.DISA STIG Cisco IOS Switch NDM v3r2Cisco

IDENTIFICATION AND AUTHENTICATION

CISC-ND-000570 - The Cisco switch must be configured to enforce password complexity by requiring that at least one uppercase character be used.DISA STIG Cisco NX-OS Switch NDM v3r2Cisco

IDENTIFICATION AND AUTHENTICATION

CISC-ND-000580 - The Cisco router must be configured to enforce password complexity by requiring that at least one lowercase character be used.DISA STIG Cisco IOS Router NDM v3r2Cisco

IDENTIFICATION AND AUTHENTICATION

CISC-ND-000580 - The Cisco router must be configured to enforce password complexity by requiring that at least one lowercase character be used.DISA STIG Cisco IOS XE Router NDM v3r2Cisco

IDENTIFICATION AND AUTHENTICATION

CISC-ND-000580 - The Cisco switch must be configured to enforce password complexity by requiring that at least one lowercase character be used.DISA STIG Cisco IOS Switch NDM v3r2Cisco

IDENTIFICATION AND AUTHENTICATION

CISC-ND-000590 - The Cisco router must be configured to enforce password complexity by requiring that at least one numeric character be used.DISA STIG Cisco IOS Router NDM v3r2Cisco

IDENTIFICATION AND AUTHENTICATION

CISC-ND-000590 - The Cisco router must be configured to enforce password complexity by requiring that at least one numeric character be used.DISA STIG Cisco IOS XE Router NDM v3r2Cisco

IDENTIFICATION AND AUTHENTICATION

CISC-ND-000590 - The Cisco switch must be configured to enforce password complexity by requiring that at least one numeric character be used.DISA STIG Cisco IOS Switch NDM v3r2Cisco

IDENTIFICATION AND AUTHENTICATION

CISC-ND-000590 - The Cisco switch must be configured to enforce password complexity by requiring that at least one numeric character be used.DISA STIG Cisco NX-OS Switch NDM v3r2Cisco

IDENTIFICATION AND AUTHENTICATION

CISC-ND-000600 - The Cisco router must be configured to enforce password complexity by requiring that at least one special character be used.DISA STIG Cisco IOS XE Router NDM v3r2Cisco

IDENTIFICATION AND AUTHENTICATION

CISC-ND-000600 - The Cisco switch must be configured to enforce password complexity by requiring that at least one special character be used.DISA STIG Cisco NX-OS Switch NDM v3r2Cisco

IDENTIFICATION AND AUTHENTICATION

CISC-ND-000600 - The Cisco switch must be configured to enforce password complexity by requiring that at least one special character be used.DISA STIG Cisco IOS Switch NDM v3r2Cisco

IDENTIFICATION AND AUTHENTICATION

CISC-ND-000610 - The Cisco router must be configured to require that when a password is changed, the characters are changed in at least eight of the positions within the password.DISA STIG Cisco IOS XE Router NDM v3r2Cisco

IDENTIFICATION AND AUTHENTICATION

CISC-ND-000610 - The Cisco switch must be configured to require that when a password is changed, the characters are changed in at least eight of the positions within the password.DISA STIG Cisco IOS Switch NDM v3r2Cisco

IDENTIFICATION AND AUTHENTICATION

JUSX-DM-000128 - For local accounts using password authentication (i.e., the root account and the account of last resort), the Juniper SRX Services Gateway must enforce a minimum 15-character password length.DISA Juniper SRX Services Gateway NDM v3r2Juniper

IDENTIFICATION AND AUTHENTICATION

JUSX-DM-000129 - For local accounts using password authentication (i.e., the root account and the account of last resort), the Juniper SRX Services Gateway must enforce password complexity by setting the password change type to character sets.DISA Juniper SRX Services Gateway NDM v3r2Juniper

IDENTIFICATION AND AUTHENTICATION

JUSX-DM-000130 - For local accounts using password authentication (i.e., the root account and the account of last resort), the Juniper SRX Services Gateway must enforce password complexity by requiring at least one uppercase character be used - i.e., the root account and the account of last resort, the Juniper SRX Services Gateway must enforce password complexity by requiring at least one upper-case character be used.DISA Juniper SRX Services Gateway NDM v3r2Juniper

IDENTIFICATION AND AUTHENTICATION

JUSX-DM-000131 - For local accounts using password authentication (i.e., the root account and the account of last resort), the Juniper SRX Services Gateway must enforce password complexity by requiring at least one lowercase character be used - i.e., the root account and the account of last resort, the Juniper SRX Services Gateway must enforce password complexity by requiring at least one lower-case character be used.DISA Juniper SRX Services Gateway NDM v3r2Juniper

IDENTIFICATION AND AUTHENTICATION

JUSX-DM-000132 - For local accounts using password authentication (i.e., the root account and the account of last resort), the Juniper SRX Services Gateway must enforce password complexity by requiring at least one numeric character be used.DISA Juniper SRX Services Gateway NDM v3r2Juniper

IDENTIFICATION AND AUTHENTICATION

JUSX-DM-000133 - For local accounts using password authentication (i.e., the root account and the account of last resort), the Juniper SRX Services Gateway must enforce password complexity by requiring at least one special character be used.DISA Juniper SRX Services Gateway NDM v3r2Juniper

IDENTIFICATION AND AUTHENTICATION

PANW-NM-000053 - If multifactor authentication is not available and passwords must be used, the Palo Alto Networks security platform must enforce a minimum 15-character password length.DISA STIG Palo Alto NDM v3r2Palo_Alto

IDENTIFICATION AND AUTHENTICATION

PANW-NM-000055 - If multifactor authentication is not available and passwords must be used, the Palo Alto Networks security platform must enforce password complexity by requiring that at least one uppercase character be used.DISA STIG Palo Alto NDM v3r2Palo_Alto

IDENTIFICATION AND AUTHENTICATION

PANW-NM-000056 - If multifactor authentication is not available and passwords must be used, the Palo Alto Networks security platform must enforce password complexity by requiring that at least one lowercase character be used.DISA STIG Palo Alto NDM v3r2Palo_Alto

IDENTIFICATION AND AUTHENTICATION

PANW-NM-000057 - If multifactor authentication is not available and passwords must be used, the Palo Alto Networks security platform must enforce password complexity by requiring that at least one numeric character be used.DISA STIG Palo Alto NDM v3r2Palo_Alto

IDENTIFICATION AND AUTHENTICATION

PANW-NM-000058 - If multifactor authentication is not available and passwords must be used, the Palo Alto Networks security platform must enforce password complexity by requiring that at least one special character be used.DISA STIG Palo Alto NDM v3r2Palo_Alto

IDENTIFICATION AND AUTHENTICATION

PANW-NM-000059 - If multifactor authentication is not available and passwords must be used, the Palo Alto Networks security platform must require that when a password is changed, the characters are changed in at least 8 of the positions within the password.DISA STIG Palo Alto NDM v3r2Palo_Alto

IDENTIFICATION AND AUTHENTICATION

WN10-00-000090 - Accounts must be configured to require password expiration.DISA Windows 10 STIG v3r2Windows

IDENTIFICATION AND AUTHENTICATION

WN10-AC-000025 - The maximum password age must be configured to 60 days or less.DISA Windows 10 STIG v3r2Windows

IDENTIFICATION AND AUTHENTICATION

WN10-AC-000030 - The minimum password age must be configured to at least 1 day.DISA Windows 10 STIG v3r2Windows

IDENTIFICATION AND AUTHENTICATION

WN10-AC-000035 - Passwords must, at a minimum, be 14 characters.DISA Windows 10 STIG v3r2Windows

IDENTIFICATION AND AUTHENTICATION

WN19-00-000020 - Windows Server 2019 passwords for the built-in Administrator account must be changed at least every 60 days.DISA Windows Server 2019 STIG v3r2Windows

IDENTIFICATION AND AUTHENTICATION

WN19-00-000050 - Windows Server 2019 manually managed application account passwords must be at least 14 characters in length.DISA Windows Server 2019 STIG v3r2Windows

IDENTIFICATION AND AUTHENTICATION

WN19-00-000210 - Windows Server 2019 passwords must be configured to expire.DISA Windows Server 2019 STIG v3r2Windows

IDENTIFICATION AND AUTHENTICATION

WN19-AC-000050 - Windows Server 2019 maximum password age must be configured to 60 days or less.DISA Windows Server 2019 STIG v3r2Windows

IDENTIFICATION AND AUTHENTICATION

WN19-AC-000060 - Windows Server 2019 minimum password age must be configured to at least one day.DISA Windows Server 2019 STIG v3r2Windows

IDENTIFICATION AND AUTHENTICATION

WN19-AC-000070 - Windows Server 2019 minimum password length must be configured to 14 characters.DISA Windows Server 2019 STIG v3r2Windows

IDENTIFICATION AND AUTHENTICATION