CCI|CCI-003628

Title

Disable accounts when the accounts are no longer associated to a user.

Reference Item Details

Category: 2024

Audit Items

View all Reference Audit Items

NamePluginAudit Name
APPL-14-003080 - The macOS system must disable accounts after 35 days of inactivity.UnixDISA Apple macOS 14 (Sonoma) STIG v2r1
JUEX-NM-000640 - The Juniper EX switch must be configured to use an authentication server for the purpose of authenticating users prior to granting administrative access.JuniperDISA Juniper EX Series Network Device Management v2r1
JUSX-DM-000095 - The Juniper SRX Services Gateway must be configured to use an authentication server to centrally manage authentication and logon settings for remote and nonlocal access.JuniperDISA Juniper SRX Services Gateway NDM v3r1
OL08-00-020260 - The OL 8 system-auth file must disable access to the system for account identifiers (individuals, groups, roles, and devices) with 35 days of inactivity.UnixDISA Oracle Linux 8 STIG v2r1
OL08-00-020261 - The OL 8 password-auth file must disable access to the system for account identifiers (individuals, groups, roles, and devices) with 35 days of inactivity.UnixDISA Oracle Linux 8 STIG v2r1
RHEL-09-411050 - RHEL 9 must disable account identifiers (individuals, groups, roles, and devices) after 35 days of inactivity.UnixDISA Red Hat Enterprise Linux 9 STIG v2r1
SLES-15-020050 - The SUSE operating system must disable account identifiers (individuals, groups, roles, and devices) after 35 days of inactivity after password expiration.UnixDISA SLES 15 STIG v2r1
SOL-11.1-040280 - User accounts must be locked after 35 days of inactivity.UnixDISA STIG Solaris 11 SPARC v3r1
SOL-11.1-040280 - User accounts must be locked after 35 days of inactivity.UnixDISA STIG Solaris 11 X86 v3r1
UBTU-22-411035 - Ubuntu 22.04 LTS must disable account identifiers (individuals, groups, roles, and devices) after 35 days of inactivity.UnixDISA STIG Canonical Ubuntu 22.04 LTS v2r1