CCI|CCI-000770

Title

The organization requires individuals to be authenticated with an individual authenticator when a group authenticator is employed.

Reference Item Details

Category: 2024

Audit Items

View all Reference Audit Items

NamePluginAudit Name
AIX7-00-001011 - Direct logins to the AIX system must not be permitted to shared accounts, default accounts, application accounts, and utility accounts.UnixDISA STIG AIX 7.x v2r9
AOSX-13-000565 - The macOS system must require individuals to be authenticated with an individual authenticator prior to using a group authenticator.UnixDISA STIG Apple Mac OSX 10.13 v2r5
AOSX-14-001100 - The macOS system must require individuals to be authenticated with an individual authenticator prior to using a group authenticator.UnixDISA STIG Apple Mac OSX 10.14 v2r6
AOSX-15-001100 - The macOS system must require individuals to be authenticated with an individual authenticator prior to using a group authenticator.UnixDISA STIG Apple Mac OSX 10.15 v1r10
APPL-11-001100 - The macOS system must require individuals to be authenticated with an individual authenticator prior to using a group authenticator.UnixDISA STIG Apple macOS 11 v1r8
APPL-11-001100 - The macOS system must require individuals to be authenticated with an individual authenticator prior to using a group authenticator.UnixDISA STIG Apple macOS 11 v1r5
APPL-12-001100 - The macOS system must require individuals to be authenticated with an individual authenticator prior to using a group authenticator.UnixDISA STIG Apple macOS 12 v1r9
APPL-13-001100 - The macOS system must require individuals to be authenticated with an individual authenticator prior to using a group authenticator.UnixDISA STIG Apple macOS 13 v1r4
Big Sur - Disable Root Login for SSHUnixNIST macOS Big Sur v1.4.0 - All Profiles
Catalina - Disable Root Login for SSHUnixNIST macOS Catalina v1.5.0 - All Profiles
DKER-EE-002180 - SAML integration must be enabled in Docker Enterprise.UnixDISA STIG Docker Enterprise 2.x Linux/Unix UCP v2r2
ESXI-06-100037 - The VMM must require individuals to be authenticated with an individual authenticator prior to using a group authenticator by using Active Directory for local user authentication.VMwareDISA STIG VMware vSphere 6.x ESXi v1r5
ESXI-06-100038 - The VMM must require individuals to be authenticated with an individual authenticator prior to using a group authenticator by using the vSphere Authentication Proxy.VMwareDISA STIG VMware vSphere 6.x ESXi v1r5
ESXI-06-100039 - The VMM must require individuals to be authenticated with an individual authenticator prior to using a group authenticator by restricting use of Active Directory ESX Admin group membership.VMwareDISA STIG VMware vSphere 6.x ESXi v1r5
ESXI-65-100037 - The ESXi host must require individuals to be authenticated with an individual authenticator prior to using a group authenticator by using Active Directory for local user authentication.VMwareDISA STIG VMware vSphere ESXi 6.5 v2r4
ESXI-67-000037 - The ESXi host must use Active Directory for local user authentication.VMwareDISA STIG VMware vSphere 6.7 ESXi v1r3
ESXI-67-000038 - ESXi hosts using Host Profiles and/or Auto Deploy must use the vSphere Authentication Proxy to protect passwords when adding themselves to Active Directory.VMwareDISA STIG VMware vSphere 6.7 ESXi v1r3
ESXI-67-000039 - Active Directory ESX Admin group membership must not be used when adding ESXi hosts to Active Directory.VMwareDISA STIG VMware vSphere 6.7 ESXi v1r3
ESXI-70-000037 - The ESXi host must use Active Directory for local user authentication.VMwareDISA STIG VMware vSphere 7.0 ESXi v1r2
F5BI-DM-000101 - The BIG-IP appliance must be configured to ensure administrators are authenticated with an individual authenticator prior to using a group authenticator.F5DISA F5 BIG-IP Device Management STIG v2r3
GEN000280 - Direct logins must not be permitted to shared, default, application, or utility accounts - '/etc/security/user rlogin=false'UnixDISA STIG AIX 5.3 v1r2
GEN000280 - Direct logins must not be permitted to shared, default, application, or utility accounts - '/etc/security/user rlogin=false'UnixDISA STIG AIX 6.1 v1r14
GEN000280 - Direct logins must not be permitted to shared, default, application, or utility accounts - 'results of last should be reviewed'UnixDISA STIG AIX 6.1 v1r14
GEN000280 - Direct logins must not be permitted to shared, default, application, or utility accounts - 'results of last should be reviewed'UnixDISA STIG AIX 5.3 v1r2
GEN000280 - Direct logins must not be permitted to shared, default, application, or utility accounts.UnixDISA STIG for Oracle Linux 5 v2r1
GEN000280 - Direct logins must not be permitted to shared, default, application, or utility accounts.UnixDISA STIG Solaris 10 X86 v2r4
GEN000280 - Direct logins must not be permitted to shared, default, application, or utility accounts.UnixDISA STIG Solaris 10 SPARC v2r4
GEN000280 - Direct logins must not be permitted to shared, default, application, or utility accounts.UnixDISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit
GEN000850 - The system must restrict the ability to switch to the root user to members of a defined group - roles=rootUnixDISA STIG Solaris 10 X86 v2r4
GEN000850 - The system must restrict the ability to switch to the root user to members of a defined group - roles=rootUnixDISA STIG Solaris 10 SPARC v2r4
GEN000850 - The system must restrict the ability to switch to the root user to members of a defined group - type=roleUnixDISA STIG Solaris 10 SPARC v2r4
GEN000850 - The system must restrict the ability to switch to the root user to members of a defined group - type=roleUnixDISA STIG Solaris 10 X86 v2r4
GEN000980 - The system must prevent the root account from directly logging in except from the system console.UnixDISA STIG AIX 5.3 v1r2
GEN000980 - The system must prevent the root account from directly logging in except from the system console.UnixDISA STIG AIX 6.1 v1r14
GEN000980 - The system must prevent the root account from directly logging in except from the system console.UnixDISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit
GEN000980 - The system must prevent the root account from directly logging in except from the system console.UnixDISA STIG Solaris 10 X86 v2r4
GEN000980 - The system must prevent the root account from directly logging in except from the system console.UnixDISA STIG Solaris 10 SPARC v2r4
GEN000980 - The system must prevent the root account from directly logging in except from the system console.UnixDISA STIG for Oracle Linux 5 v2r1
GEN001020 - The root account must not be used for direct log in.UnixDISA STIG for Oracle Linux 5 v2r1
GEN001020 - The root account must not be used for direct logins - configuredUnixDISA STIG Solaris 10 X86 v2r4
GEN001020 - The root account must not be used for direct logins - configuredUnixDISA STIG Solaris 10 SPARC v2r4
GEN001020 - The root account must not be used for direct logins - login reportUnixDISA STIG Solaris 10 X86 v2r4
GEN001020 - The root account must not be used for direct logins - login reportUnixDISA STIG Solaris 10 SPARC v2r4
GEN001020 - The root account must not be used for direct logins.UnixDISA STIG AIX 6.1 v1r14
GEN001020 - The root account must not be used for direct logins.UnixDISA STIG AIX 5.3 v1r2
GEN001020 - The root account must not be used for direct logins.UnixDISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit
GEN001120 - The system must not permit root logins using remote access programs such as SSH.UnixDISA STIG Solaris 10 X86 v2r4
GEN001120 - The system must not permit root logins using remote access programs such as SSH.UnixDISA STIG Solaris 10 SPARC v2r4
GEN001120 - The system must not permit root logins using remote access programs such as ssh.UnixDISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit
GEN001120 - The system must not permit root logins using remote access programs such as ssh.UnixDISA STIG for Oracle Linux 5 v2r1