AOSX-15-003008 - The macOS system must enforce a 60-day maximum password lifetime restriction. | DISA STIG Apple Mac OSX 10.15 v1r8 | Unix | |
Big Sur - Restrict Maximum Password Lifetime to 60 Days | NIST macOS Big Sur v1.4.0 - 800-53r4 High | Unix | IDENTIFICATION AND AUTHENTICATION |
Big Sur - Restrict Maximum Password Lifetime to 60 Days | NIST macOS Big Sur v1.4.0 - 800-53r5 High | Unix | IDENTIFICATION AND AUTHENTICATION |
Catalina - Restrict Maximum Password Lifetime to 60 Days | NIST macOS Catalina v1.5.0 - 800-53r5 High | Unix | IDENTIFICATION AND AUTHENTICATION |
Catalina - Restrict Maximum Password Lifetime to 60 Days | NIST macOS Catalina v1.5.0 - All Profiles | Unix | IDENTIFICATION AND AUTHENTICATION |
O121-C2-015200 - The DBMS must enforce password maximum lifetime restrictions - EFFECTIVE_TIME | DISA STIG Oracle 12c v2r6 Database | OracleDB | |
OL6-00-000055 - System and application account passwords must be changed at least annually. | DISA STIG Oracle Linux 6 v2r6 | Unix | |
OL07-00-010250 - The Oracle Linux operating system must be configured so that passwords for new users are restricted to a 60-day maximum lifetime. | DISA Oracle Linux 7 STIG v2r12 | Unix | |
OL07-00-010250 - The Oracle Linux operating system must be configured so that passwords for new users are restricted to a 60-day maximum lifetime. | DISA Oracle Linux 7 STIG v2r9 | Unix | |
OL07-00-010260 - The Oracle Linux operating system must be configured so that existing passwords are restricted to a 60-day maximum lifetime. | DISA Oracle Linux 7 STIG v2r11 | Unix | |
OL07-00-010260 - The Oracle Linux operating system must be configured so that existing passwords are restricted to a 60-day maximum lifetime. | DISA Oracle Linux 7 STIG v2r12 | Unix | |
RHEL-07-010260 - The Red Hat Enterprise Linux operating system must be configured so that existing passwords are restricted to a 60-day maximum lifetime. | DISA Red Hat Enterprise Linux 7 STIG v3r10 | Unix | |
RHEL-07-010260 - The Red Hat Enterprise Linux operating system must be configured so that existing passwords are restricted to a 60-day maximum lifetime. | DISA Red Hat Enterprise Linux 7 STIG v3r14 | Unix | |
SLES-12-010280 - The SUSE operating system must be configured to create or update passwords with a maximum lifetime of 60 days. | DISA SLES 12 STIG v2r7 | Unix | |
SLES-12-010280 - The SUSE operating system must be configured to create or update passwords with a maximum lifetime of 60 days. | DISA SLES 12 STIG v2r12 | Unix | |
SLES-12-010290 - The SUSE operating system must employ user passwords with a maximum lifetime of 60 days. | DISA SLES 12 STIG v2r12 | Unix | |
SLES-12-010290 - The SUSE operating system must employ user passwords with a maximum lifetime of 60 days. | DISA SLES 12 STIG v2r9 | Unix | |
SLES-12-010290 - The SUSE operating system must employ user passwords with a maximum lifetime of 60 days. | DISA SLES 12 STIG v2r6 | Unix | |
SOL-11.1-040010 - User passwords must be changed at least every 60 days | DISA STIG Solaris 11 SPARC v2r8 | Unix | |
SOL-11.1-040010 - User passwords must be changed at least every 60 days | DISA STIG Solaris 11 X86 v2r8 | Unix | |
SOL-11.1-040010 - User passwords must be changed at least every 60 days - 'MAXDAYS' | DISA STIG Solaris 11 X86 v2r7 | Unix | |
SOL-11.1-040010 - User passwords must be changed at least every 60 days - 'MAXWEEKS' | DISA STIG Solaris 11 X86 v2r7 | Unix | |
SOL-11.1-040010 - User passwords must be changed at least every 60 days - 'MAXWEEKS' | DISA STIG Solaris 11 SPARC v2r7 | Unix | |
SOL-11.1-040010 - User passwords must be changed at least every 60 days. | DISA STIG Solaris 11 X86 v2r10 | Unix | |
SPLK-CL-000380 - Splunk Enterprise must enforce a 60-day maximum password lifetime restriction for the account of last resort. | DISA STIG Splunk Enterprise 7.x for Windows v2r3 REST API | Splunk | |
SPLK-CL-000380 - Splunk Enterprise must enforce a 60-day maximum password lifetime restriction for the account of last resort. | DISA STIG Splunk Enterprise 7.x for Windows v2r4 REST API | Splunk | |
SQL2-00-038910 - If SQL Server authentication, using passwords, is employed, SQL Server must enforce the DoD standards for password lifetime. | DISA STIG SQL Server 2012 DB Instance Security v1r20 | MS_SQLDB | IDENTIFICATION AND AUTHENTICATION |
UBTU-18-010107 - The Ubuntu operating system must enforce a 60-day maximum password lifetime restriction. Passwords for new users must have a 60-day maximum password lifetime restriction. | DISA STIG Ubuntu 18.04 LTS v2r12 | Unix | |
WN10-00-000090 - Accounts must be configured to require password expiration. | DISA Windows 10 STIG v2r4 | Windows | |
WN10-AC-000025 - The maximum password age must be configured to 60 days or less. | DISA Windows 10 STIG v2r9 | Windows | |
WN10-AC-000025 - The maximum password age must be configured to 60 days or less. | DISA Windows 10 STIG v2r4 | Windows | |
WN10-AC-000025 - The maximum password age must be configured to 60 days or less. | DISA Windows 10 STIG v2r8 | Windows | |
WN10-SO-000280 - Passwords for enabled local Administrator accounts must be changed at least every 60 days. | DISA Windows 10 STIG v2r8 | Windows | |
WN12-AC-000005 - The maximum password age must meet requirements. | DISA Windows Server 2012 and 2012 R2 MS STIG v3r5 | Windows | |
WN12-AC-000005 - The maximum password age must meet requirements. | DISA Windows Server 2012 and 2012 R2 DC STIG v3r5 | Windows | |
WN12-AC-000005 - The maximum password age must meet requirements. | DISA Windows Server 2012 and 2012 R2 DC STIG v3r6 | Windows | |
WN12-AC-000005 - The maximum password age must meet requirements. | DISA Windows Server 2012 and 2012 R2 MS STIG v3r4 | Windows | |
WN12-AC-000005 - The maximum password age must meet requirements. | DISA Windows Server 2012 and 2012 R2 MS STIG v3r6 | Windows | |
WN12-GE-000016 - Windows 2012/2012 R2 passwords must be configured to expire. | DISA Windows Server 2012 and 2012 R2 DC STIG v3r6 | Windows | |
WN12-GE-000016 - Windows 2012/2012 R2 passwords must be configured to expire. | DISA Windows Server 2012 and 2012 R2 MS STIG v3r4 | Windows | |
WN12-GE-000016 - Windows 2012/2012 R2 passwords must be configured to expire. | DISA Windows Server 2012 and 2012 R2 MS STIG v3r5 | Windows | |
WN12-GE-000016 - Windows 2012/2012 R2 passwords must be configured to expire. | DISA Windows Server 2012 and 2012 R2 DC STIG v3r4 | Windows | |
WN16-00-000030 - Passwords for the built-in Administrator account must be changed at least every 60 days. | DISA Windows Server 2016 STIG v2r6 | Windows | |
WN16-00-000230 - Passwords must be configured to expire. | DISA Windows Server 2016 STIG v2r7 | Windows | |
WN19-00-000020 - Windows Server 2019 passwords for the built-in Administrator account must be changed at least every 60 days. | DISA Windows Server 2019 STIG v2r9 | Windows | |
WN19-00-000020 - Windows Server 2019 passwords for the built-in Administrator account must be changed at least every 60 days. | DISA Windows Server 2019 STIG v2r4 | Windows | |
WN19-00-000210 - Windows Server 2019 passwords must be configured to expire. | DISA Windows Server 2019 STIG v2r9 | Windows | |
WN19-00-000210 - Windows Server 2019 passwords must be configured to expire. | DISA Windows Server 2019 STIG v2r4 | Windows | |
WN19-AC-000050 - Windows Server 2019 maximum password age must be configured to 60 days or less. | DISA Windows Server 2019 STIG v2r8 | Windows | |
WN19-AC-000050 - Windows Server 2019 maximum password age must be configured to 60 days or less. | DISA Windows Server 2019 STIG v2r9 | Windows | |