800-53|IA-4e.

Title

IDENTIFIER MANAGEMENT

Description

Disabling the identifier after [Assignment: organization-defined time period of inactivity].

Reference Item Details

Category: IDENTIFICATION AND AUTHENTICATION

Family: IDENTIFICATION AND AUTHENTICATION

Baseline Impact: LOW,MODERATE,HIGH

Audit Items

View all Reference Audit Items

NamePluginAudit Name
4.019 - Outdated or unused accounts must be removed from the system.WindowsDISA Windows Vista STIG v6r41
5.5.1.9 Ensure inactive password lock is 0 days - individuals, groups, roles, and devices if the password expires.UnixCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
Big Sur - Disable Accounts after 35 Days of InactivityUnixNIST macOS Big Sur v1.4.0 - 800-53r5 Moderate
Big Sur - Disable Accounts after 35 Days of InactivityUnixNIST macOS Big Sur v1.4.0 - 800-171
Big Sur - Disable Accounts after 35 Days of InactivityUnixNIST macOS Big Sur v1.4.0 - All Profiles
Big Sur - Disable Accounts after 35 Days of InactivityUnixNIST macOS Big Sur v1.4.0 - CNSSI 1253
Big Sur - Disable Accounts after 35 Days of InactivityUnixNIST macOS Big Sur v1.4.0 - 800-53r4 Moderate
Big Sur - Disable Accounts after 35 Days of InactivityUnixNIST macOS Big Sur v1.4.0 - 800-53r4 High
Big Sur - Disable Accounts after 35 Days of InactivityUnixNIST macOS Big Sur v1.4.0 - 800-53r4 Low
Big Sur - Disable Accounts after 35 Days of InactivityUnixNIST macOS Big Sur v1.4.0 - 800-53r5 High
Catalina - Disable Accounts after 35 Days of InactivityUnixNIST macOS Catalina v1.5.0 - 800-171
Catalina - Disable Accounts after 35 Days of InactivityUnixNIST macOS Catalina v1.5.0 - All Profiles
Catalina - Disable Accounts after 35 Days of InactivityUnixNIST macOS Catalina v1.5.0 - 800-53r5 High
Catalina - Disable Accounts after 35 Days of InactivityUnixNIST macOS Catalina v1.5.0 - CNSSI 1253
Catalina - Disable Accounts after 35 Days of InactivityUnixNIST macOS Catalina v1.5.0 - 800-53r4 High
Catalina - Disable Accounts after 35 Days of InactivityUnixNIST macOS Catalina v1.5.0 - 800-53r4 Moderate
Catalina - Disable Accounts after 35 Days of InactivityUnixNIST macOS Catalina v1.5.0 - 800-53r4 Low
Catalina - Disable Accounts after 35 Days of InactivityUnixNIST macOS Catalina v1.5.0 - 800-53r5 Moderate
GEN000760 - Accounts must be locked upon 35 days of inactivity.UnixDISA STIG for Oracle Linux 5 v2r1
GEN006660 - Accounts must be locked upon 35 days of inactivity.UnixDISA STIG for Oracle Linux 5 v2r1
JBOS-AS-000290 - JBoss management Interfaces must be integrated with a centralized authentication mechanism that is configured to manage accounts according to DoD policy.UnixDISA RedHat JBoss EAP 6.3 STIG v2r4
Monterey - Disable Accounts after 35 Days of InactivityUnixNIST macOS Monterey v1.0.0 - 800-171
Monterey - Disable Accounts after 35 Days of InactivityUnixNIST macOS Monterey v1.0.0 - 800-53r4 Low
Monterey - Disable Accounts after 35 Days of InactivityUnixNIST macOS Monterey v1.0.0 - CNSSI 1253
Monterey - Disable Accounts after 35 Days of InactivityUnixNIST macOS Monterey v1.0.0 - All Profiles
Monterey - Disable Accounts after 35 Days of InactivityUnixNIST macOS Monterey v1.0.0 - 800-53r4 High
Monterey - Disable Accounts after 35 Days of InactivityUnixNIST macOS Monterey v1.0.0 - 800-53r5 High
Monterey - Disable Accounts after 35 Days of InactivityUnixNIST macOS Monterey v1.0.0 - 800-53r5 Moderate
Monterey - Disable Accounts after 35 Days of InactivityUnixNIST macOS Monterey v1.0.0 - 800-53r4 Moderate
OL6-00-000335 - The operating system must manage information system identifiers for users and devices by disabling the user identifier after an organization defined time period of inactivity.UnixDISA STIG Oracle Linux 6 v2r7
OL07-00-010310 - The Oracle Linux operating system must disable account identifiers (individuals, groups, roles, and devices) if the password expires - individuals, groups, roles, and devices if the password expires.UnixDISA Oracle Linux 7 STIG v2r14
PHTN-30-000035 - The Photon operating system must disable new accounts immediately upon password expiration.UnixDISA STIG VMware vSphere 7.0 Photon OS v1r3
PHTN-67-000036 - The Photon operating system must disable new accounts immediately upon password expiration.UnixDISA STIG VMware vSphere 6.7 Photon OS v1r6
RHEL-06-000335 - The operating system must manage information system identifiers for users and devices by disabling the user identifier after an organization defined time period of inactivity.UnixDISA Red Hat Enterprise Linux 6 STIG v2r2
RHEL-07-010310 - The Red Hat Enterprise Linux operating system must disable account identifiers (individuals, groups, roles, and devices) if the password expires.UnixDISA Red Hat Enterprise Linux 7 STIG v3r15
RHEL-08-020260 - RHEL 8 account identifiers (individuals, groups, roles, and devices) must be disabled after 35 days of inactivity.UnixDISA Red Hat Enterprise Linux 8 STIG v2r1
RHEL-09-411050 - RHEL 9 must disable account identifiers (individuals, groups, roles, and devices) after 35 days of inactivity.UnixDISA Red Hat Enterprise Linux 9 STIG v2r2
SLES-12-010340 - The SUSE operating system must disable account identifiers (individuals, groups, roles, and devices) after 35 days of inactivity after password expiration.UnixDISA SLES 12 STIG v2r13
UBTU-16-010280 - Account identifiers (individuals, groups, roles, and devices) must disabled after 35 days of inactivity.UnixDISA STIG Ubuntu 16.04 LTS v2r3
UBTU-18-010445 - The Ubuntu operating system must disable account identifiers (individuals, groups, roles, and devices) after 35 days of inactivity.UnixDISA STIG Ubuntu 18.04 LTS v2r15
UBTU-20-010409 - The Ubuntu operating system must disable account identifiers (individuals, groups, roles, and devices) after 35 days of inactivity.UnixDISA STIG Ubuntu 20.04 LTS v2r1
UBTU-22-411035 - Ubuntu 22.04 LTS must disable account identifiers (individuals, groups, roles, and devices) after 35 days of inactivity.UnixDISA STIG Canonical Ubuntu 22.04 LTS v2r2
VCSA-70-000059 - The vCenter Server must uniquely identify and authenticate users or processes acting on behalf of users.VMwareDISA STIG VMware vSphere 7.0 vCenter v1r3
WN10-00-000065 - Unused accounts must be disabled or removed from the system after 35 days of inactivity.WindowsDISA Windows 10 STIG v3r2
WN11-00-000065 - Unused accounts must be disabled or removed from the system after 35 days of inactivity.WindowsDISA Windows 11 STIG v2r2
WN12-GE-000014 - Outdated or unused accounts must be removed from the system or disabled.WindowsDISA Windows Server 2012 and 2012 R2 DC STIG v3r7
WN12-GE-000014 - Outdated or unused accounts must be removed from the system or disabled.WindowsDISA Windows Server 2012 and 2012 R2 MS STIG v3r7
WN16-00-000210 - Outdated or unused accounts must be removed from the system or disabled.WindowsDISA Windows Server 2016 STIG v2r9
WN19-00-000190 - Windows Server 2019 outdated or unused accounts must be removed or disabled.WindowsDISA Windows Server 2019 STIG v3r2
WN22-00-000190 - Windows Server 2022 outdated or unused accounts must be removed or disabled.WindowsDISA Windows Server 2022 STIG v2r2