Audits
Settings
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Theme
Light
Dark
Auto
Help
Plugins
Overview
Plugins Pipeline
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
LCE Families
Tenable OT Security Families
About Plugin Families
Release Notes
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Settings
Theme
Light
Dark
Auto
Detections
Plugins
Overview
Plugins Pipeline
Release Notes
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
LCE Families
Tenable OT Security Families
About Plugin Families
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
Analytics
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
Audits
References
CCI
CCI-000770
CCI
CCI|CCI-000770
Title
The organization requires individuals to be authenticated with an individual authenticator when a group authenticator is employed.
Reference Item Details
Reference:
CCI - DISA Control Correlation Identifier
Category:
2024
Audit Items
View all Reference Audit Items
Name
Plugin
Audit Name
AIX7-00-001011 - Direct logins to the AIX system must not be permitted to shared accounts, default accounts, application accounts, and utility accounts.
Unix
DISA STIG AIX 7.x v2r9
AOSX-13-000565 - The macOS system must require individuals to be authenticated with an individual authenticator prior to using a group authenticator.
Unix
DISA STIG Apple Mac OSX 10.13 v2r5
AOSX-14-001100 - The macOS system must require individuals to be authenticated with an individual authenticator prior to using a group authenticator.
Unix
DISA STIG Apple Mac OSX 10.14 v2r6
AOSX-15-001100 - The macOS system must require individuals to be authenticated with an individual authenticator prior to using a group authenticator.
Unix
DISA STIG Apple Mac OSX 10.15 v1r10
APPL-11-001100 - The macOS system must require individuals to be authenticated with an individual authenticator prior to using a group authenticator.
Unix
DISA STIG Apple macOS 11 v1r8
APPL-11-001100 - The macOS system must require individuals to be authenticated with an individual authenticator prior to using a group authenticator.
Unix
DISA STIG Apple macOS 11 v1r5
APPL-12-001100 - The macOS system must require individuals to be authenticated with an individual authenticator prior to using a group authenticator.
Unix
DISA STIG Apple macOS 12 v1r9
APPL-13-001100 - The macOS system must require individuals to be authenticated with an individual authenticator prior to using a group authenticator.
Unix
DISA STIG Apple macOS 13 v1r4
Big Sur - Disable Root Login for SSH
Unix
NIST macOS Big Sur v1.4.0 - All Profiles
Catalina - Disable Root Login for SSH
Unix
NIST macOS Catalina v1.5.0 - All Profiles
DKER-EE-002180 - SAML integration must be enabled in Docker Enterprise.
Unix
DISA STIG Docker Enterprise 2.x Linux/Unix UCP v2r2
ESXI-06-100037 - The VMM must require individuals to be authenticated with an individual authenticator prior to using a group authenticator by using Active Directory for local user authentication.
VMware
DISA STIG VMware vSphere 6.x ESXi v1r5
ESXI-06-100038 - The VMM must require individuals to be authenticated with an individual authenticator prior to using a group authenticator by using the vSphere Authentication Proxy.
VMware
DISA STIG VMware vSphere 6.x ESXi v1r5
ESXI-06-100039 - The VMM must require individuals to be authenticated with an individual authenticator prior to using a group authenticator by restricting use of Active Directory ESX Admin group membership.
VMware
DISA STIG VMware vSphere 6.x ESXi v1r5
ESXI-65-100037 - The ESXi host must require individuals to be authenticated with an individual authenticator prior to using a group authenticator by using Active Directory for local user authentication.
VMware
DISA STIG VMware vSphere ESXi 6.5 v2r4
ESXI-67-000037 - The ESXi host must use Active Directory for local user authentication.
VMware
DISA STIG VMware vSphere 6.7 ESXi v1r3
ESXI-67-000038 - ESXi hosts using Host Profiles and/or Auto Deploy must use the vSphere Authentication Proxy to protect passwords when adding themselves to Active Directory.
VMware
DISA STIG VMware vSphere 6.7 ESXi v1r3
ESXI-67-000039 - Active Directory ESX Admin group membership must not be used when adding ESXi hosts to Active Directory.
VMware
DISA STIG VMware vSphere 6.7 ESXi v1r3
ESXI-70-000037 - The ESXi host must use Active Directory for local user authentication.
VMware
DISA STIG VMware vSphere 7.0 ESXi v1r2
F5BI-DM-000101 - The BIG-IP appliance must be configured to ensure administrators are authenticated with an individual authenticator prior to using a group authenticator.
F5
DISA F5 BIG-IP Device Management STIG v2r3
GEN000280 - Direct logins must not be permitted to shared, default, application, or utility accounts - '/etc/security/user rlogin=false'
Unix
DISA STIG AIX 5.3 v1r2
GEN000280 - Direct logins must not be permitted to shared, default, application, or utility accounts - '/etc/security/user rlogin=false'
Unix
DISA STIG AIX 6.1 v1r14
GEN000280 - Direct logins must not be permitted to shared, default, application, or utility accounts - 'results of last should be reviewed'
Unix
DISA STIG AIX 6.1 v1r14
GEN000280 - Direct logins must not be permitted to shared, default, application, or utility accounts - 'results of last should be reviewed'
Unix
DISA STIG AIX 5.3 v1r2
GEN000280 - Direct logins must not be permitted to shared, default, application, or utility accounts.
Unix
DISA STIG for Oracle Linux 5 v2r1
GEN000280 - Direct logins must not be permitted to shared, default, application, or utility accounts.
Unix
DISA STIG Solaris 10 X86 v2r4
GEN000280 - Direct logins must not be permitted to shared, default, application, or utility accounts.
Unix
DISA STIG Solaris 10 SPARC v2r4
GEN000280 - Direct logins must not be permitted to shared, default, application, or utility accounts.
Unix
DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit
GEN000850 - The system must restrict the ability to switch to the root user to members of a defined group - roles=root
Unix
DISA STIG Solaris 10 X86 v2r4
GEN000850 - The system must restrict the ability to switch to the root user to members of a defined group - roles=root
Unix
DISA STIG Solaris 10 SPARC v2r4
GEN000850 - The system must restrict the ability to switch to the root user to members of a defined group - type=role
Unix
DISA STIG Solaris 10 SPARC v2r4
GEN000850 - The system must restrict the ability to switch to the root user to members of a defined group - type=role
Unix
DISA STIG Solaris 10 X86 v2r4
GEN000980 - The system must prevent the root account from directly logging in except from the system console.
Unix
DISA STIG AIX 5.3 v1r2
GEN000980 - The system must prevent the root account from directly logging in except from the system console.
Unix
DISA STIG AIX 6.1 v1r14
GEN000980 - The system must prevent the root account from directly logging in except from the system console.
Unix
DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit
GEN000980 - The system must prevent the root account from directly logging in except from the system console.
Unix
DISA STIG Solaris 10 X86 v2r4
GEN000980 - The system must prevent the root account from directly logging in except from the system console.
Unix
DISA STIG Solaris 10 SPARC v2r4
GEN000980 - The system must prevent the root account from directly logging in except from the system console.
Unix
DISA STIG for Oracle Linux 5 v2r1
GEN001020 - The root account must not be used for direct log in.
Unix
DISA STIG for Oracle Linux 5 v2r1
GEN001020 - The root account must not be used for direct logins - configured
Unix
DISA STIG Solaris 10 X86 v2r4
GEN001020 - The root account must not be used for direct logins - configured
Unix
DISA STIG Solaris 10 SPARC v2r4
GEN001020 - The root account must not be used for direct logins - login report
Unix
DISA STIG Solaris 10 X86 v2r4
GEN001020 - The root account must not be used for direct logins - login report
Unix
DISA STIG Solaris 10 SPARC v2r4
GEN001020 - The root account must not be used for direct logins.
Unix
DISA STIG AIX 6.1 v1r14
GEN001020 - The root account must not be used for direct logins.
Unix
DISA STIG AIX 5.3 v1r2
GEN001020 - The root account must not be used for direct logins.
Unix
DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit
GEN001120 - The system must not permit root logins using remote access programs such as SSH.
Unix
DISA STIG Solaris 10 X86 v2r4
GEN001120 - The system must not permit root logins using remote access programs such as SSH.
Unix
DISA STIG Solaris 10 SPARC v2r4
GEN001120 - The system must not permit root logins using remote access programs such as ssh.
Unix
DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit
GEN001120 - The system must not permit root logins using remote access programs such as ssh.
Unix
DISA STIG for Oracle Linux 5 v2r1