1.1.2 Ensure 'Maximum password age' is set to '60 or fewer days, but not 0' | CIS Microsoft Windows 8.1 v2.4.1 L1 | Windows | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
1.1.3 Ensure 'Minimum password age' is set to '1 or more day(s)' | CIS Microsoft Windows 8.1 v2.4.1 L1 | Windows | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
6.2.15 Ensure all groups in /etc/passwd exist in /etc/group | CIS Debian 8 Server L1 v2.0.2 | Unix | ACCESS CONTROL |
6.2.15 Ensure all groups in /etc/passwd exist in /etc/group | CIS Debian 8 Workstation L1 v2.0.2 | Unix | ACCESS CONTROL |
9.2 Check for Duplicate User Names | CIS Oracle Solaris 11.4 L1 v1.1.0 | Unix | ACCESS CONTROL |
9.13 Check Groups in passwd | CIS Oracle Solaris 11.4 L1 v1.1.0 | Unix | ACCESS CONTROL |
17.1.1 (L1) Ensure 'Audit Credential Validation' is set to 'Success and Failure' | CIS Microsoft Windows 8.1 v2.4.1 L1 Bitlocker | Windows | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
17.1.1 Ensure 'Audit Credential Validation' is set to 'Success and Failure' | CIS Microsoft Windows 8.1 v2.4.1 L1 | Windows | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
17.2.1 (L1) Ensure 'Audit Application Group Management' is set to 'Success and Failure' | CIS Microsoft Windows 8.1 v2.4.1 L1 Bitlocker | Windows | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
17.2.1 Ensure 'Audit Application Group Management' is set to 'Success and Failure' | CIS Microsoft Windows 8.1 v2.4.1 L1 | Windows | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
APPL-15-003080 - The macOS system must disable accounts after 35 days of inactivity. | DISA Apple macOS 15 (Sequoia) STIG v1r1 | Unix | ACCESS CONTROL |
F5BI-DM-000017 - The BIG-IP appliance must automatically disable accounts after a 35-day period of account inactivity. | DISA F5 BIG-IP Device Management STIG v2r3 | F5 | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
GEN000760 - Accounts must be locked upon 35 days of inactivity. | DISA STIG AIX 6.1 v1r14 | Unix | ACCESS CONTROL |
GEN000760 - Accounts must be locked upon 35 days of inactivity. | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN000760 - Accounts must be locked upon 35 days of inactivity. | DISA STIG Solaris 10 SPARC v2r4 | Unix | ACCESS CONTROL |
GEN000760 - Accounts must be locked upon 35 days of inactivity. | DISA STIG Solaris 10 X86 v2r4 | Unix | ACCESS CONTROL |
GEN000760 - Accounts must be locked upon 35 days of inactivity. | DISA STIG for Oracle Linux 5 v2r1 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
GEN006660 - Accounts must be locked upon 35 days of inactivity. | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN006660 - Accounts must be locked upon 35 days of inactivity. | DISA STIG for Oracle Linux 5 v2r1 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
OL6-00-000334 - Accounts must be locked upon 35 days of inactivity. | DISA STIG Oracle Linux 6 v2r7 | Unix | ACCESS CONTROL |
RHEL-06-000334 - Accounts must be locked upon 35 days of inactivity. | DISA Red Hat Enterprise Linux 6 STIG v2r2 | Unix | ACCESS CONTROL |
SOL-11.1-040280 - User accounts must be locked after 35 days of inactivity. | DISA STIG Solaris 11 X86 v3r1 | Unix | ACCESS CONTROL |
SOL-11.1-040280 - User accounts must be locked after 35 days of inactivity. | DISA STIG Solaris 11 SPARC v3r1 | Unix | ACCESS CONTROL |