| 1.4.6 Ensure a unique name is set as the superusers account (UEFI) | CIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIG | Unix | ACCESS CONTROL |
| 1.8.2 Ensure GDM disable-user-list is configured | CIS AlmaLinux OS 10 v1.0.0 L1 Server | Unix | CONFIGURATION MANAGEMENT |
| 1.8.2 Ensure GDM disable-user-list is configured | CIS Oracle Linux 10 v1.0.0 L1 Server | Unix | CONFIGURATION MANAGEMENT |
| 1.8.2 Ensure GDM disable-user-list is configured | CIS Red Hat Enterprise Linux 10 v1.0.1 L1 Workstation | Unix | CONFIGURATION MANAGEMENT |
| 1.8.2 Ensure GDM disable-user-list is configured | CIS AlmaLinux OS 10 v1.0.0 L1 Workstation | Unix | CONFIGURATION MANAGEMENT |
| 1.8.2 Ensure GDM disable-user-list is configured | CIS Oracle Linux 10 v1.0.0 L1 Workstation | Unix | CONFIGURATION MANAGEMENT |
| 1.8.2 Ensure GDM disable-user-list is configured | CIS Oracle Linux 8 v4.0.0 L1 Workstation | Unix | CONFIGURATION MANAGEMENT |
| 1.8.2 Ensure GDM disable-user-list is configured | CIS AlmaLinux OS 8 v4.0.0 L1 Workstation | Unix | CONFIGURATION MANAGEMENT |
| 1.8.14 Ensure the operating system disables the user logon list for graphical user interfaces | CIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIG | Unix | CONFIGURATION MANAGEMENT |
| 5.1.9 Ensure sshd GSSAPIAuthentication is disabled | CIS Oracle Linux 10 v1.0.0 L1 Workstation | Unix | CONFIGURATION MANAGEMENT |
| 5.1.9 Ensure sshd GSSAPIAuthentication is disabled | CIS Red Hat Enterprise Linux 10 v1.0.1 L1 Workstation | Unix | CONFIGURATION MANAGEMENT |
| 5.1.10 Ensure sshd GSSAPIAuthentication is disabled | CIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIG | Unix | CONFIGURATION MANAGEMENT |
| 5.1.10 Ensure sshd HostbasedAuthentication is disabled | CIS Oracle Linux 10 v1.0.0 L1 Workstation | Unix | CONFIGURATION MANAGEMENT |
| 5.1.10 Ensure sshd HostbasedAuthentication is disabled | CIS Red Hat Enterprise Linux 10 v1.0.1 L1 Server | Unix | CONFIGURATION MANAGEMENT |
| 5.1.10 Ensure sshd HostbasedAuthentication is disabled | CIS AlmaLinux OS 10 v1.0.0 L1 Server | Unix | CONFIGURATION MANAGEMENT |
| 5.1.11 Ensure sshd GSSAPIAuthentication is disabled | CIS Red Hat Enterprise Linux 8 v4.0.0 L2 Server | Unix | CONFIGURATION MANAGEMENT |
| 5.1.11 Ensure sshd GSSAPIAuthentication is disabled | CIS Oracle Linux 8 v4.0.0 L1 Workstation | Unix | CONFIGURATION MANAGEMENT |
| 5.1.11 Ensure sshd GSSAPIAuthentication is disabled | CIS Oracle Linux 8 v4.0.0 L2 Server | Unix | CONFIGURATION MANAGEMENT |
| 5.1.11 Ensure sshd GSSAPIAuthentication is disabled | CIS Rocky Linux 8 v3.0.0 L2 Server | Unix | CONFIGURATION MANAGEMENT |
| 5.1.12 Ensure sshd HostbasedAuthentication is disabled | CIS AlmaLinux OS 8 v4.0.0 L1 Workstation | Unix | CONFIGURATION MANAGEMENT |
| 5.1.12 Ensure sshd HostbasedAuthentication is disabled | CIS Red Hat Enterprise Linux 8 v4.0.0 L1 Server | Unix | CONFIGURATION MANAGEMENT |
| 5.1.12 Ensure sshd HostbasedAuthentication is disabled | CIS Rocky Linux 8 v3.0.0 L1 Server | Unix | CONFIGURATION MANAGEMENT |
| 5.1.12 Ensure sshd HostbasedAuthentication is disabled | CIS Oracle Linux 8 v4.0.0 L1 Workstation | Unix | CONFIGURATION MANAGEMENT |
| 5.1.12 Ensure sshd HostbasedAuthentication is disabled | CIS Rocky Linux 8 v3.0.0 L1 Workstation | Unix | CONFIGURATION MANAGEMENT |
| 5.3.1.3 Ensure pam_pwquality module is enabled | CIS AlmaLinux OS 10 v1.0.0 L1 Workstation | Unix | CONFIGURATION MANAGEMENT |
| 5.3.2.3 Ensure pam_pwquality module is enabled | CIS AlmaLinux OS 8 v4.0.0 L1 Server | Unix | CONFIGURATION MANAGEMENT |
| 5.3.2.3 Ensure pam_pwquality module is enabled | CIS AlmaLinux OS 8 v4.0.0 L1 Workstation | Unix | CONFIGURATION MANAGEMENT |
| 5.3.2.3 Ensure pam_pwquality module is enabled | CIS Oracle Linux 8 v4.0.0 L1 Server | Unix | CONFIGURATION MANAGEMENT |
| 5.3.2.3 Ensure pam_pwquality module is enabled | CIS Oracle Linux 8 v4.0.0 L1 Workstation | Unix | CONFIGURATION MANAGEMENT |
| 5.3.2.3 Ensure pam_pwquality module is enabled | CIS Rocky Linux 8 v3.0.0 L1 Workstation | Unix | CONFIGURATION MANAGEMENT |
| 5.3.2.3 Ensure pam_pwquality module is enabled | CIS Rocky Linux 8 v3.0.0 L1 Server | Unix | CONFIGURATION MANAGEMENT |
| 5.3.2.4.1 Ensure pam_unix does not include nullok | CIS Red Hat Enterprise Linux 10 v1.0.1 L1 Server | Unix | CONFIGURATION MANAGEMENT |
| 5.3.3.2.16 Ensure dictcheck is configured | CIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIG | Unix | CONFIGURATION MANAGEMENT |
| 5.3.3.4.1 Ensure pam_unix does not include nullok | CIS Oracle Linux 8 v4.0.0 L1 Workstation | Unix | CONFIGURATION MANAGEMENT |
| 5.3.3.4.1 Ensure pam_unix does not include nullok | CIS Red Hat Enterprise Linux 8 STIG v2.0.0 L1 Workstation | Unix | CONFIGURATION MANAGEMENT |
| 5.3.3.4.1 Ensure pam_unix does not include nullok | CIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIG | Unix | CONFIGURATION MANAGEMENT |
| 5.3.3.4.1 Ensure pam_unix does not include nullok | CIS Rocky Linux 8 v3.0.0 L1 Server | Unix | CONFIGURATION MANAGEMENT |
| 5.3.3.4.1 Ensure pam_unix does not include nullok | CIS AlmaLinux OS 8 v4.0.0 L1 Server | Unix | CONFIGURATION MANAGEMENT |
| 5.3.3.4.1 Ensure pam_unix does not include nullok | CIS AlmaLinux OS 8 v4.0.0 L1 Workstation | Unix | CONFIGURATION MANAGEMENT |
| 5.4.3.7 Ensure the operating system enforces a 60-day maximum password lifetime for new user accounts | CIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIG | Unix | IDENTIFICATION AND AUTHENTICATION |
| 7.1.14 Ensure there are no ".shosts" files on the operating system | CIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIG | Unix | CONFIGURATION MANAGEMENT |
| 7.2.2 Ensure /etc/shadow password fields are not empty | CIS AlmaLinux OS 8 v4.0.0 L1 Workstation | Unix | CONFIGURATION MANAGEMENT |
| 7.2.2 Ensure /etc/shadow password fields are not empty | CIS Oracle Linux 8 v4.0.0 L1 Workstation | Unix | CONFIGURATION MANAGEMENT |
| 7.2.2 Ensure /etc/shadow password fields are not empty | CIS Red Hat Enterprise Linux 10 v1.0.1 L1 Server | Unix | CONFIGURATION MANAGEMENT |
| 7.2.2 Ensure /etc/shadow password fields are not empty | CIS Red Hat Enterprise Linux 8 STIG v2.0.0 L1 Server | Unix | CONFIGURATION MANAGEMENT |
| 7.2.2 Ensure /etc/shadow password fields are not empty | CIS Red Hat Enterprise Linux 8 v4.0.0 L1 Workstation | Unix | CONFIGURATION MANAGEMENT |
| 7.2.2 Ensure /etc/shadow password fields are not empty | CIS Rocky Linux 8 v3.0.0 L1 Workstation | Unix | CONFIGURATION MANAGEMENT |
| 7.2.2 Ensure /etc/shadow password fields are not empty | CIS AlmaLinux OS 10 v1.0.0 L1 Server | Unix | CONFIGURATION MANAGEMENT |
| 7.2.2 Ensure /etc/shadow password fields are not empty | CIS Oracle Linux 10 v1.0.0 L1 Server | Unix | CONFIGURATION MANAGEMENT |
| 7.2.2 Ensure /etc/shadow password fields are not empty | CIS Red Hat Enterprise Linux 8 STIG v2.0.0 L1 Workstation | Unix | CONFIGURATION MANAGEMENT |