Audits
Settings
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Theme
Light
Dark
Auto
Help
Plugins
Overview
Plugins Pipeline
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
LCE Families
Tenable OT Security Families
About Plugin Families
Release Notes
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Settings
Theme
Light
Dark
Auto
Detections
Plugins
Overview
Plugins Pipeline
Release Notes
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
LCE Families
Tenable OT Security Families
About Plugin Families
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
Analytics
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
Audits
References
CCI
CCI-002038
CCI
CCI|CCI-002038
Title
The organization requires users to reauthenticate upon organization-defined circumstances or situations requiring reauthentication.
Reference Item Details
Reference:
CCI - DISA Control Correlation Identifier
Category:
2024
Audit Items
View all Reference Audit Items
Name
Plugin
Audit Name
3.070 - The system is configured to permit storage of credentials or .NET Passports.
Windows
DISA Windows Vista STIG v6r41
3.129 - User Account Control - Built In Admin Approval Mode
Windows
DISA Windows Vista STIG v6r41
3.131 - User Account Control - Behavior of elevation prompt for standard users.
Windows
DISA Windows Vista STIG v6r41
3.137 - User Account Control - Run all admins in Admin Approval Mode
Windows
DISA Windows Vista STIG v6r41
5.2.4 Ensure users must provide password for escalation
Unix
CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
5.2.5 Ensure users must re-authenticate for privilege escalation
Unix
CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
5.2.7 Ensure sudo authentication timeout is configured - sudo command.
Unix
CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
5.042 - Terminal Services is not configured to always prompt a client for passwords upon connection.
Windows
DISA Windows Vista STIG v6r41
5.116 - Terminal Services / Remote Desktop Service - Prevent password saving in the Remote Desktop Client
Windows
DISA Windows Vista STIG v6r41
5.224 - Power Mgmt - Password Wake on Battery
Windows
DISA Windows Vista STIG v6r41
5.225 - Power Mgmt - Password Wake When Plugged In
Windows
DISA Windows Vista STIG v6r41
AIX7-00-002061 - AIX must remove NOPASSWD tag from sudo config files.
Unix
DISA STIG AIX 7.x v2r9
AIX7-00-002062 - AIX must remove !authenticate option from sudo config files.
Unix
DISA STIG AIX 7.x v2r9
AIX7-00-002108 - If GSSAPI authentication is not required on AIX, the SSH daemon must disable GSSAPI authentication.
Unix
DISA STIG AIX 7.x v2r9
APPL-13-004022 - The macOS system must require users to reauthenticate for privilege escalation when using the 'sudo' command - sudo command.
Unix
DISA STIG Apple macOS 13 v1r4
Big Sur - Require users to reauthenticate for privilege escalation
Unix
NIST macOS Big Sur v1.4.0 - All Profiles
Big Sur - Require users to reauthenticate when changing authenticators
Unix
NIST macOS Big Sur v1.4.0 - 800-53r5 High
Big Sur - Require users to reauthenticate when changing authenticators
Unix
NIST macOS Big Sur v1.4.0 - All Profiles
Big Sur - Require users to reauthenticate when changing authenticators
Unix
NIST macOS Big Sur v1.4.0 - 800-53r5 Moderate
Big Sur - Require users to reauthenticate when changing authenticators
Unix
NIST macOS Big Sur v1.4.0 - 800-53r5 Low
Catalina - Require users to reauthenticate for privilege escalation
Unix
NIST macOS Catalina v1.5.0 - All Profiles
Catalina - Require users to reauthenticate when changing authenticators
Unix
NIST macOS Catalina v1.5.0 - All Profiles
DKER-EE-002490 - The Lifetime Minutes and Renewal Threshold Minutes Login Session Controls must be set to 10 and 0 respectively in Docker Enterprise - lifetime_minutes
Unix
DISA STIG Docker Enterprise 2.x Linux/Unix UCP v2r2
DKER-EE-002490 - The Lifetime Minutes and Renewal Threshold Minutes Login Session Controls must be set to 10 and 0 respectively in Docker Enterprise - renewal_threshold_minutes
Unix
DISA STIG Docker Enterprise 2.x Linux/Unix UCP v2r2
EP11-00-008800 - The EDB Postgres Advanced Server must require users to re-authenticate when organization-defined circumstances or situations require re-authentication.
PostgreSQLDB
EDB PostgreSQL Advanced Server v11 DB Audit v2r4
F5BI-AP-000191 - The BIG-IP APM module must require users to reauthenticate when the user's role or information authorizations are changed.
F5
DISA F5 BIG-IP Access Policy Manager STIG v2r3
F5BI-AP-000230 - The F5 BIG-IP appliance must be configured to set a 'Maximum Session Timeout' value of 8 hours or less.
F5
DISA F5 BIG-IP Access Policy Manager STIG v2r3
F5BI-LT-000191 - The BIG-IP Core implementation must require users to reauthenticate when the user's role, the information authorizations, and/or the maximum session timeout is exceeded for the virtual server(s).
F5
DISA F5 BIG-IP Local Traffic Manager STIG v2r3
GEN001025 - The sudo command must require authentication - /etc/sudoers - !authenticate
Unix
DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit
GEN001025 - The sudo command must require authentication - /etc/sudoers.d/* - !authenticate
Unix
DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit
GEN001025 - The sudo command must require authentication - /etc/sudoers.d/* - NOPASSWD
Unix
DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit
GEN001025 - The sudo command must require authentication - /etc/sudoers !authenticate
Unix
DISA STIG for Oracle Linux 5 v2r1
GEN001025 - The sudo command must require authentication - /etc/sudoers NOPASSWD
Unix
DISA STIG for Oracle Linux 5 v2r1
GEN001025 - The sudo command must require authentication - /etc/sudoers.d/ !authenticate
Unix
DISA STIG for Oracle Linux 5 v2r1
GEN001025 - The sudo command must require authentication - /etc/sudoers.d/ NOPASSWD
Unix
DISA STIG for Oracle Linux 5 v2r1
GEN001025 - The sudo command must require authentication -/etc/sudoers - NOPASSWD
Unix
DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit
MD3X-00-000700 - MongoDB must require users to reauthenticate when organization-defined circumstances or situations require reauthentication.
Unix
DISA STIG MongoDB Enterprise Advanced 3.x v2r3 OS
MD4X-00-005600 - MongoDB must require users to reauthenticate when organization-defined circumstances or situations require reauthentication.
Unix
DISA STIG MongoDB Enterprise Advanced 4.x v1r4 OS
Monterey - Require users to reauthenticate for privilege escalation
Unix
NIST macOS Monterey v1.0.0 - All Profiles
Monterey - Require users to reauthenticate when changing authenticators
Unix
NIST macOS Monterey v1.0.0 - 800-53r5 Moderate
Monterey - Require users to reauthenticate when changing authenticators
Unix
NIST macOS Monterey v1.0.0 - 800-53r5 High
Monterey - Require users to reauthenticate when changing authenticators
Unix
NIST macOS Monterey v1.0.0 - All Profiles
Monterey - Require users to reauthenticate when changing authenticators
Unix
NIST macOS Monterey v1.0.0 - 800-53r5 Low
OL6-00-000529 - The sudo command must require authentication - !authenticate
Unix
DISA STIG Oracle Linux 6 v2r7
OL6-00-000529 - The sudo command must require authentication - nopasswd
Unix
DISA STIG Oracle Linux 6 v2r7
OL6-00-000537 - The Oracle Linux operating system must require re-authentication when using the 'sudo' command - sudo command.
Unix
DISA STIG Oracle Linux 6 v2r7
OL07-00-010340 - The Oracle Linux operating system must be configured so that users must provide a password for privilege escalation.
Unix
DISA Oracle Linux 7 STIG v2r14
OL07-00-010343 - The Oracle Linux operating system must require re-authentication when using the 'sudo' command - sudo command.
Unix
DISA Oracle Linux 7 STIG v2r14
OL07-00-010344 - The Oracle Linux operating system must not be configured to bypass password requirements for privilege escalation.
Unix
DISA Oracle Linux 7 STIG v2r14
OL07-00-010350 - The Oracle Linux operating system must be configured so users must re-authenticate for privilege escalation.
Unix
DISA Oracle Linux 7 STIG v2r14