Item Search

NameAudit NamePluginCategory
1.4.2 Ensure 'Failed Attempts' and 'Lockout Time' for Authentication Profile are properly configured - Lockout TimeCIS Palo Alto Firewall 8 Benchmark L1 v1.0.0Palo_Alto

ACCESS CONTROL

2.2.10 Ensure 'SEC_MAX_FAILED_LOGIN_ATTEMPTS' Is '3' or LessCIS Oracle Server 18c DB Traditional Auditing v1.1.0OracleDB

ACCESS CONTROL

2.2.10 Ensure 'SEC_MAX_FAILED_LOGIN_ATTEMPTS' Is '3' or LessCIS Oracle Server 18c DB Unified Auditing v1.1.0OracleDB

ACCESS CONTROL

2.2.12 Ensure 'SEC_MAX_FAILED_LOGIN_ATTEMPTS' Is '3' or LessCIS Oracle Server 12c DB Traditional Auditing v3.0.0OracleDB

ACCESS CONTROL

2.2.12 Ensure 'SEC_MAX_FAILED_LOGIN_ATTEMPTS' Is '3' or LessCIS Oracle Server 12c DB Unified Auditing v3.0.0OracleDB

ACCESS CONTROL

2.4.5 Ensure 'Maximum number of failed attempts' is set to '6'AirWatch - CIS Apple iOS 13 and iPadOS 13 v1.0.0 End User Owned L1MDM

CONFIGURATION MANAGEMENT

2.4.5 Ensure 'Maximum number of failed attempts' is set to '6'MobileIron - CIS Apple iOS 13 and iPadOS 13 v1.0.0 End User Owned L1MDM

CONFIGURATION MANAGEMENT

2.4.5 Ensure 'Maximum number of failed attempts' is set to '6'AirWatch - CIS Apple iOS 14 and iPadOS 14 v1.0.0 End User Owned L1MDM

CONFIGURATION MANAGEMENT

3.1 Ensure 'FAILED_LOGIN_ATTEMPTS' Is Less than or Equal to '5'CIS Oracle Server 18c DB Unified Auditing v1.1.0OracleDB

ACCESS CONTROL

3.1 Ensure 'FAILED_LOGIN_ATTEMPTS' Is Less than or Equal to '5'CIS Oracle Server 12c DB Unified Auditing v3.0.0OracleDB

ACCESS CONTROL

3.1 Ensure 'FAILED_LOGIN_ATTEMPTS' Is Less than or Equal to '5'CIS Oracle Server 12c DB Traditional Auditing v3.0.0OracleDB

ACCESS CONTROL

3.2 Ensure 'PASSWORD_LOCK_TIME' Is Greater than or Equal to '1'CIS Oracle Server 12c DB Traditional Auditing v3.0.0OracleDB

ACCESS CONTROL

3.2 Ensure 'PASSWORD_LOCK_TIME' Is Greater than or Equal to '1'CIS Oracle Server 12c DB Unified Auditing v3.0.0OracleDB

ACCESS CONTROL

3.2 Ensure 'PASSWORD_LOCK_TIME' Is Greater than or Equal to '1'CIS Oracle Server 18c DB Traditional Auditing v1.1.0OracleDB

ACCESS CONTROL

3.2 Ensure 'PASSWORD_LOCK_TIME' Is Greater than or Equal to '1'CIS Oracle Server 18c DB Unified Auditing v1.1.0OracleDB

ACCESS CONTROL

3.4.5 Ensure 'Maximum number of failed attempts' is set to '6'AirWatch - CIS Apple iOS 13 and iPadOS 13 Institution Owned L1MDM

CONFIGURATION MANAGEMENT

3.4.5 Ensure 'Maximum number of failed attempts' is set to '6'AirWatch - CIS Apple iOS 14 and iPadOS 14 Institution Owned L1MDM

CONFIGURATION MANAGEMENT

5.2.6 Ensure SSH MaxAuthTries is set to 4 or lessCIS Debian Family Workstation L1 v1.0.0Unix

ACCESS CONTROL

5.2.7 Ensure SSH MaxAuthTries is set to 4 or lessCIS Debian 9 Workstation L1 v1.0.1Unix

ACCESS CONTROL

5.2.7 Ensure SSH MaxAuthTries is set to 4 or lessCIS Aliyun Linux 2 L1 v1.0.0Unix

ACCESS CONTROL

5.2.7 Ensure SSH MaxAuthTries is set to 4 or lessCIS Debian 9 Server L1 v1.0.1Unix

ACCESS CONTROL

5.3.1 Ensure password creation requirements are configured - retry=3CIS Debian Family Server L1 v1.0.0Unix

IDENTIFICATION AND AUTHENTICATION

5.3.1 Ensure password creation requirements are configured - retry=3CIS Debian 9 Workstation L1 v1.0.1Unix

IDENTIFICATION AND AUTHENTICATION

5.3.2 Ensure lockout for failed password attempts is configuredCIS Debian 9 Workstation L1 v1.0.1Unix

ACCESS CONTROL

5.3.2 Ensure lockout for failed password attempts is configured - account pam_tally2.soCIS Ubuntu Linux 18.04 LXD Host L1 Server v1.0.0Unix

ACCESS CONTROL

5.3.2 Ensure lockout for failed password attempts is configured - account pam_tally2.soCIS Ubuntu Linux 18.04 LXD Host L1 Workstation v1.0.0Unix

ACCESS CONTROL

5.3.2 Ensure lockout for failed password attempts is configured - account pam_tally2.soCIS Ubuntu Linux 18.04 LXD Container L1 v1.0.0Unix

ACCESS CONTROL

5.3.2 Ensure lockout for failed password attempts is configured - auth pam_tally2.soCIS Ubuntu Linux 18.04 LXD Host L1 Server v1.0.0Unix

ACCESS CONTROL

5.3.2 Ensure lockout for failed password attempts is configured - auth pam_tally2.soCIS Ubuntu Linux 18.04 LXD Host L1 Workstation v1.0.0Unix

ACCESS CONTROL

5.3.2 Ensure lockout for failed password attempts is configured - pam_tally2.soCIS Debian Family Workstation L1 v1.0.0Unix

ACCESS CONTROL

5.3.2 Ensure lockout for failed password attempts is configured - password-auth 'auth [default=die] pam_faillock.so'CIS Aliyun Linux 2 L1 v1.0.0Unix

CONFIGURATION MANAGEMENT

5.3.2 Ensure lockout for failed password attempts is configured - password-auth 'auth [success=1 default=bad] pam_unix.so'CIS Aliyun Linux 2 L1 v1.0.0Unix

CONFIGURATION MANAGEMENT

5.3.2 Ensure lockout for failed password attempts is configured - password-auth 'auth required pam_faillock.so'CIS Aliyun Linux 2 L1 v1.0.0Unix

CONFIGURATION MANAGEMENT

5.3.2 Ensure lockout for failed password attempts is configured - password-auth 'auth sufficient pam_faillock.so'CIS Aliyun Linux 2 L1 v1.0.0Unix

CONFIGURATION MANAGEMENT

5.3.2 Ensure lockout for failed password attempts is configured - system-auth 'auth required pam_faillock.so'CIS Aliyun Linux 2 L1 v1.0.0Unix

CONFIGURATION MANAGEMENT

5.3.2 Ensure lockout for failed password attempts is configured - system-auth 'auth sufficient pam_faillock.so'CIS Aliyun Linux 2 L1 v1.0.0Unix

CONFIGURATION MANAGEMENT

5.3.2 Lockout for failed password attempts - 'auth [default=die] pam_faillock.so authfail audit deny=5 unlock_time=900'CIS Distribution Independent Linux Workstation L1 v2.0.0Unix

ACCESS CONTROL

5.3.2 Lockout for failed password attempts - 'auth required pam_faillock.so preauth audit silent deny=5 unlock_time=900'CIS Distribution Independent Linux Workstation L1 v2.0.0Unix

ACCESS CONTROL

5.3.2 Lockout for failed password attempts - 'auth required pam_tally2.so onerr=fail audit silent deny=5 unlock_time=900'CIS Distribution Independent Linux Server L1 v2.0.0Unix

ACCESS CONTROL

5.3.2 Lockout for failed password attempts - 'auth required pam_tally2.so onerr=fail audit silent deny=5 unlock_time=900'CIS Distribution Independent Linux Workstation L1 v2.0.0Unix

ACCESS CONTROL

5.3.2 Lockout for failed password attempts - 'auth sufficient pam_unix.so'CIS Distribution Independent Linux Workstation L1 v2.0.0Unix

ACCESS CONTROL

5.3.2 Lockout for failed password attempts - password-auth 'auth sufficient pam_faillock.so authsucc audit deny=5 unlock_time=900'CIS Distribution Independent Linux Workstation L1 v2.0.0Unix

ACCESS CONTROL

5.3.8 Ensure SSH MaxAuthTries is set to 4 or lessCIS Red Hat 6 Server L1 v3.0.0Unix

ACCESS CONTROL

5.3.8 Ensure SSH MaxAuthTries is set to 4 or lessCIS Red Hat 6 Workstation L1 v3.0.0Unix

ACCESS CONTROL

5.3.8 Ensure SSH MaxAuthTries is set to 4 or lessCIS CentOS 6 Workstation L1 v3.0.0Unix

ACCESS CONTROL

5.3.8 Ensure SSH MaxAuthTries is set to 4 or lessCIS Oracle Linux 6 Workstation L1 v2.0.0Unix

ACCESS CONTROL

5.4.1 Ensure password creation requirements are configured - system-auth retry=3CIS CentOS 6 Workstation L1 v3.0.0Unix

IDENTIFICATION AND AUTHENTICATION

5.4.1 Ensure password creation requirements are configured - system-auth retry=3CIS Red Hat 6 Workstation L1 v3.0.0Unix

IDENTIFICATION AND AUTHENTICATION

5.4.1 Ensure password creation requirements are configured - system-auth retry=3CIS Oracle Linux 6 Server L1 v2.0.0Unix

IDENTIFICATION AND AUTHENTICATION

6.3.2 Set Lockout for Failed Password Attempts - auth required pam_tally2.so deny=5 onerr=failCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL