CCI|CCI-004061

Title

For password-based authentication, verify when users create or update passwords, that the passwords are not found on the list of commonly-used, expected, or compromised passwords in IA-5 (1) (a).

Reference Item Details

Category: 2024

Audit Items

View all Reference Audit Items

NamePluginAudit Name
JUEX-NM-000640 - The Juniper EX switch must be configured to use an authentication server for the purpose of authenticating users prior to granting administrative access.JuniperDISA Juniper EX Series Network Device Management v2r1
JUSX-DM-000095 - The Juniper SRX Services Gateway must be configured to use an authentication server to centrally manage authentication and logon settings for remote and nonlocal access.JuniperDISA Juniper SRX Services Gateway NDM v3r1
O121-C2-014000 - The DBMS must support organizational requirements to prohibit password reuse for the organization-defined number of generations.OracleDBDISA STIG Oracle 12c v3r1 Database
SPLK-CL-000390 - Splunk Enterprise must prohibit password reuse for a minimum of five generations for the account of last resort.SplunkDISA STIG Splunk Enterprise 7.x for Windows v3r1 REST API
SPLK-CL-000410 - Splunk Enterprise must be configured to prohibit password reuse for a minimum of five generations.UnixDISA STIG Splunk Enterprise 8.x for Linux v2r1 STIG OS
WN10-AC-000020 - The password history must be configured to 24 passwords remembered.WindowsDISA Windows 10 STIG v3r1
WN11-AC-000020 - The password history must be configured to 24 passwords remembered.WindowsDISA Windows 11 STIG v2r1
WN19-AC-000040 - Windows Server 2019 password history must be configured to 24 passwords remembered.WindowsDISA Windows Server 2019 STIG v3r1
WN22-AC-000040 - Windows Server 2022 password history must be configured to 24 passwords remembered.WindowsDISA Windows Server 2022 STIG v2r1