Audits
Settings
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Theme
Light
Dark
Auto
Help
Plugins
Overview
Plugins Pipeline
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
LCE Families
Tenable OT Security Families
About Plugin Families
Release Notes
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Settings
Theme
Light
Dark
Auto
Detections
Plugins
Overview
Plugins Pipeline
Release Notes
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
LCE Families
Tenable OT Security Families
About Plugin Families
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
Analytics
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
Audits
References
CCI
CCI-004895
CCI
CCI|CCI-004895
Title
Permit users to invoke the trusted communications path for communications between the user and the organization-defined security functions, including at a minimum, authentication and re-authentication.
Reference Item Details
Reference:
CCI - DISA Control Correlation Identifier
Category:
2024
Audit Items
View all Reference Audit Items
Name
Plugin
Audit Name
AIX7-00-002061 - AIX must remove NOPASSWD tag from sudo config files.
Unix
DISA STIG AIX 7.x v3r1
AIX7-00-002062 - AIX must remove !authenticate option from sudo config files.
Unix
DISA STIG AIX 7.x v3r1
AIX7-00-002108 - If GSSAPI authentication is not required on AIX, the SSH daemon must disable GSSAPI authentication.
Unix
DISA STIG AIX 7.x v3r1
APPL-14-004022 - The macOS system must require users to reauthenticate for privilege escalation when using the "sudo" command.
Unix
DISA Apple macOS 14 (Sonoma) STIG v2r2
APPL-14-004060 - The macOS system must configure sudoers timestamp type.
Unix
DISA Apple macOS 14 (Sonoma) STIG v2r2
CASA-VN-000350 - The Cisco ASA VPN gateway must be configured to renegotiate the IPsec Security Association after eight hours or less.
Cisco
DISA STIG Cisco ASA VPN v2r2
CASA-VN-000360 - The Cisco ASA VPN gateway must be configured to renegotiate the IKE security association after 24 hours or less.
Cisco
DISA STIG Cisco ASA VPN v2r2
OL08-00-010381 - OL 8 must require users to reauthenticate for privilege escalation and changing roles.
Unix
DISA Oracle Linux 8 STIG v2r2
PHTN-40-000133 The Photon operating system must require users to reauthenticate for privilege escalation.
Unix
DISA VMware vSphere 8.0 vCenter Appliance Photon OS 4.0 STIG v2r1
RHEL-08-010380 - RHEL 8 must require users to provide a password for privilege escalation.
Unix
DISA Red Hat Enterprise Linux 8 STIG v2r1
RHEL-08-010381 - RHEL 8 must require users to reauthenticate for privilege escalation.
Unix
DISA Red Hat Enterprise Linux 8 STIG v2r1
RHEL-09-432015 - RHEL 9 must require reauthentication when using the 'sudo' command - sudo command.
Unix
DISA Red Hat Enterprise Linux 9 STIG v2r2
RHEL-09-611145 - RHEL 9 must not be configured to bypass password requirements for privilege escalation.
Unix
DISA Red Hat Enterprise Linux 9 STIG v2r2
SLES-12-010110 - The SUSE operating system must reauthenticate users when changing authenticators, roles, or escalating privileges.
Unix
DISA SLES 12 STIG v3r1
SLES-12-010113 - The SUSE operating system must require re-authentication when using the 'sudo' command - sudo command.
Unix
DISA SLES 12 STIG v3r1
SLES-15-010450 - The SUSE operating system must reauthenticate users when changing authenticators, roles, or escalating privileges.
Unix
DISA SLES 15 STIG v2r2
SLES-15-020102 - The SUSE operating system must require reauthentication when using the 'sudo' command - sudo command.
Unix
DISA SLES 15 STIG v2r2
SPLK-CL-000180 - Splunk Enterprise idle session timeout must be set to not exceed 15 minutes.
Splunk
DISA STIG Splunk Enterprise 7.x for Windows v3r1 REST API
UBTU-20-010014 - The Ubuntu operating system must require users to reauthenticate for privilege escalation or when changing roles.
Unix
DISA STIG Ubuntu 20.04 LTS v2r1
UBTU-22-432010 - Ubuntu 22.04 LTS must require users to reauthenticate for privilege escalation or when changing roles.
Unix
DISA STIG Canonical Ubuntu 22.04 LTS v2r2
VCSA-80-000089 The vCenter Server must terminate vSphere Client sessions after 15 minutes of inactivity.
VMware
DISA VMware vSphere 8.0 vCenter STIG v2r1
WN10-CC-000145 - Users must be prompted for a password on resume from sleep (on battery).
Windows
DISA Windows 10 STIG v3r2
WN10-CC-000150 - The user must be prompted for a password on resume from sleep (plugged in).
Windows
DISA Windows 10 STIG v3r2
WN10-CC-000270 - Passwords must not be saved in the Remote Desktop Client.
Windows
DISA Windows 10 STIG v3r2
WN10-CC-000280 - Remote Desktop Services must always prompt a client for passwords upon connection.
Windows
DISA Windows 10 STIG v3r2
WN10-CC-000355 - The Windows Remote Management (WinRM) service must not store RunAs credentials.
Windows
DISA Windows 10 STIG v3r2
WN10-SO-000245 - User Account Control approval mode for the built-in Administrator must be enabled.
Windows
DISA Windows 10 STIG v3r2
WN10-SO-000255 - User Account Control must automatically deny elevation requests for standard users.
Windows
DISA Windows 10 STIG v3r2
WN10-SO-000270 - User Account Control must run all administrators in Admin Approval Mode, enabling UAC.
Windows
DISA Windows 10 STIG v3r2
WN11-CC-000145 - Users must be prompted for a password on resume from sleep (on battery).
Windows
DISA Windows 11 STIG v2r2
WN11-CC-000150 - The user must be prompted for a password on resume from sleep (plugged in).
Windows
DISA Windows 11 STIG v2r2
WN11-CC-000270 - Passwords must not be saved in the Remote Desktop Client.
Windows
DISA Windows 11 STIG v2r2
WN11-CC-000280 - Remote Desktop Services must always prompt a client for passwords upon connection.
Windows
DISA Windows 11 STIG v2r2
WN11-CC-000355 - The Windows Remote Management (WinRM) service must not store RunAs credentials.
Windows
DISA Windows 11 STIG v2r2
WN11-SO-000245 - User Account Control approval mode for the built-in Administrator must be enabled.
Windows
DISA Windows 11 STIG v2r2
WN11-SO-000255 - User Account Control must automatically deny elevation requests for standard users.
Windows
DISA Windows 11 STIG v2r2
WN11-SO-000270 - User Account Control must run all administrators in Admin Approval Mode, enabling UAC.
Windows
DISA Windows 11 STIG v2r2
WN19-CC-000340 - Windows Server 2019 must not save passwords in the Remote Desktop Client.
Windows
DISA Windows Server 2019 STIG v3r2
WN19-CC-000360 - Windows Server 2019 Remote Desktop Services must always prompt a client for passwords upon connection.
Windows
DISA Windows Server 2019 STIG v3r2
WN19-CC-000520 - Windows Server 2019 Windows Remote Management (WinRM) service must not store RunAs credentials.
Windows
DISA Windows Server 2019 STIG v3r2
WN19-SO-000380 - Windows Server 2019 User Account Control approval mode for the built-in Administrator must be enabled.
Windows
DISA Windows Server 2019 STIG v3r2
WN19-SO-000410 - Windows Server 2019 User Account Control must automatically deny standard user requests for elevation.
Windows
DISA Windows Server 2019 STIG v3r2
WN19-SO-000440 - Windows Server 2019 User Account Control must run all administrators in Admin Approval Mode, enabling UAC.
Windows
DISA Windows Server 2019 STIG v3r2
WN22-CC-000340 - Windows Server 2022 must not save passwords in the Remote Desktop Client.
Windows
DISA Windows Server 2022 STIG v2r2
WN22-CC-000360 - Windows Server 2022 Remote Desktop Services must always prompt a client for passwords upon connection.
Windows
DISA Windows Server 2022 STIG v2r2
WN22-CC-000520 - Windows Server 2022 Windows Remote Management (WinRM) service must not store RunAs credentials.
Windows
DISA Windows Server 2022 STIG v2r2
WN22-SO-000380 - Windows Server 2022 User Account Control (UAC) approval mode for the built-in Administrator must be enabled.
Windows
DISA Windows Server 2022 STIG v2r2
WN22-SO-000410 - Windows Server 2022 User Account Control (UAC) must automatically deny standard user requests for elevation.
Windows
DISA Windows Server 2022 STIG v2r2
WN22-SO-000440 - Windows Server 2022 User Account Control (UAC) must run all administrators in Admin Approval Mode, enabling UAC.
Windows
DISA Windows Server 2022 STIG v2r2