Big Sur - Require users to reauthenticate for privilege escalation | NIST macOS Big Sur v1.4.0 - All Profiles | Unix | IDENTIFICATION AND AUTHENTICATION |
Big Sur - Require users to reauthenticate when changing authenticators | NIST macOS Big Sur v1.4.0 - 800-53r5 High | Unix | IDENTIFICATION AND AUTHENTICATION |
Big Sur - Require users to reauthenticate when changing authenticators | NIST macOS Big Sur v1.4.0 - 800-53r5 Low | Unix | IDENTIFICATION AND AUTHENTICATION |
Big Sur - Require users to reauthenticate when changing authenticators | NIST macOS Big Sur v1.4.0 - 800-53r5 Moderate | Unix | IDENTIFICATION AND AUTHENTICATION |
Big Sur - Require users to reauthenticate when changing authenticators | NIST macOS Big Sur v1.4.0 - All Profiles | Unix | IDENTIFICATION AND AUTHENTICATION |
CASA-VN-000360 - The Cisco ASA VPN gateway must be configured to renegotiate the IKE security association after 24 hours or less. | DISA STIG Cisco ASA VPN v1r2 | Cisco | |
Catalina - Require users to reauthenticate for privilege escalation | NIST macOS Catalina v1.5.0 - All Profiles | Unix | IDENTIFICATION AND AUTHENTICATION |
Catalina - Require users to reauthenticate when changing authenticators | NIST macOS Catalina v1.5.0 - All Profiles | Unix | IDENTIFICATION AND AUTHENTICATION |
F5BI-LT-000310 - The F5 BIG-IP Core implementation must be configured to set a 'Maximum Session Timeout' value of 24 hours or less for the virtual server. | DISA F5 BIG-IP Local Traffic Manager 11.x STIG v2r2 | F5 | |
MADB-10-008200 - MariaDB must require users to reauthenticate when organization-defined circumstances or situations require reauthentication. | DISA MariaDB Enterprise 10.x v1r2 DB | MySQLDB | |
Monterey - Require users to reauthenticate for privilege escalation | NIST macOS Monterey v1.0.0 - All Profiles | Unix | IDENTIFICATION AND AUTHENTICATION |
Monterey - Require users to reauthenticate when changing authenticators | NIST macOS Monterey v1.0.0 - 800-53r5 Low | Unix | IDENTIFICATION AND AUTHENTICATION |
Monterey - Require users to reauthenticate when changing authenticators | NIST macOS Monterey v1.0.0 - 800-53r5 Moderate | Unix | IDENTIFICATION AND AUTHENTICATION |
Monterey - Require users to reauthenticate when changing authenticators | NIST macOS Monterey v1.0.0 - All Profiles | Unix | IDENTIFICATION AND AUTHENTICATION |
Monterey - Require users to reauthenticate when changing authenticators | NIST macOS Monterey v1.0.0 - 800-53r5 High | Unix | IDENTIFICATION AND AUTHENTICATION |
OL07-00-010350 - The Oracle Linux operating system must be configured so users must re-authenticate for privilege escalation | DISA Oracle Linux 7 STIG v2r12 | Unix | |
OL07-00-010350 - The Oracle Linux operating system must be configured so users must re-authenticate for privilege escalation - sudoers.d | DISA Oracle Linux 7 STIG v2r11 | Unix | |
OL08-00-010380 - OL 8 must require users to provide a password for privilege escalation. | DISA Oracle Linux 8 STIG v1r8 | Unix | |
OL08-00-010381 - OL 8 must require users to reauthenticate for privilege escalation and changing roles. | DISA Oracle Linux 8 STIG v1r2 | Unix | |
OL08-00-010381 - OL 8 must require users to reauthenticate for privilege escalation and changing roles. | DISA Oracle Linux 8 STIG v1r4 | Unix | |
OL08-00-010384 - OL 8 must require re-authentication when using the 'sudo' command | DISA Oracle Linux 8 STIG v1r7 | Unix | |
OL08-00-010384 - OL 8 must require re-authentication when using the 'sudo' command - sudo command | DISA Oracle Linux 8 STIG v1r8 | Unix | |
OL08-00-010384 - OL 8 must require re-authentication when using the 'sudo' command - sudo command. | DISA Oracle Linux 8 STIG v1r6 | Unix | |
OL08-00-010384 - OL 8 must require re-authentication when using the 'sudo' command. | DISA Oracle Linux 8 STIG v1r1 | Unix | |
OL08-00-010385 - The OL 8 operating system must not be configured to bypass password requirements for privilege escalation. | DISA Oracle Linux 8 STIG v1r4 | Unix | |
RHEL-07-010343 - The Red Hat Enterprise Linux operating system must require re-authentication when using the 'sudo' command - sudo command. | DISA Red Hat Enterprise Linux 7 STIG v3r5 | Unix | |
RHEL-08-010380 - RHEL 8 must require users to provide a password for privilege escalation. | DISA Red Hat Enterprise Linux 8 STIG v1r5 | Unix | |
RHEL-08-010380 - RHEL 8 must require users to provide a password for privilege escalation. | DISA Red Hat Enterprise Linux 8 STIG v1r7 | Unix | |
RHEL-08-010380 - RHEL 8 must require users to provide a password for privilege escalation. | DISA Red Hat Enterprise Linux 8 STIG v1r8 | Unix | |
RHEL-08-010381 - RHEL 8 must require users to reauthenticate for privilege escalation. | DISA Red Hat Enterprise Linux 8 STIG v1r8 | Unix | |
RHEL-08-010381 - RHEL 8 must require users to reauthenticate for privilege escalation. | DISA Red Hat Enterprise Linux 8 STIG v1r11 | Unix | |
RHEL-08-010381 - RHEL 8 must require users to reauthenticate for privilege escalation. | DISA Red Hat Enterprise Linux 8 STIG v1r3 | Unix | |
RHEL-08-010384 - RHEL 8 must require re-authentication when using the 'sudo' command - sudo command. | DISA Red Hat Enterprise Linux 8 STIG v1r5 | Unix | |
RHEL-08-010384 - RHEL 8 must require re-authentication when using the 'sudo' command - sudo command. | DISA Red Hat Enterprise Linux 8 STIG v1r6 | Unix | |
RHEL-08-010384 - RHEL 8 must require re-authentication when using the 'sudo' command - sudo command. | DISA Red Hat Enterprise Linux 8 STIG v1r9 | Unix | |
SLES-12-010114 - The SUSE operating system must not be configured to bypass password requirements for privilege escalation. | DISA SLES 12 STIG v2r12 | Unix | |
SLES-12-010114 - The SUSE operating system must not be configured to bypass password requirements for privilege escalation. | DISA SLES 12 STIG v2r7 | Unix | |
SLES-15-020102 - The SUSE operating system must require re-authentication when using the 'sudo' command. | DISA SLES 15 STIG v1r10 | Unix | |
SLES-15-020104 - The SUSE operating system must not be configured to bypass password requirements for privilege escalation. | DISA SLES 15 STIG v1r9 | Unix | |
UBTU-20-010014 - The Ubuntu operating system must require users to reauthenticate for privilege escalation or when changing roles. | DISA STIG Ubuntu 20.04 LTS v1r1 | Unix | |
UBTU-20-010014 - The Ubuntu operating system must require users to reauthenticate for privilege escalation or when changing roles. | DISA STIG Ubuntu 20.04 LTS v1r10 | Unix | |
UBTU-20-010014 - The Ubuntu operating system must require users to reauthenticate for privilege escalation or when changing roles. | DISA STIG Ubuntu 20.04 LTS v1r4 | Unix | |
WN11-CC-000150 - The user must be prompted for a password on resume from sleep (plugged in). | DISA Windows 11 STIG v1r5 | Windows | |
WN11-CC-000270 - Passwords must not be saved in the Remote Desktop Client. | DISA Windows 11 STIG v1r2 | Windows | |
WN11-CC-000270 - Passwords must not be saved in the Remote Desktop Client. | DISA Windows 11 STIG v1r4 | Windows | |
WN11-CC-000270 - Passwords must not be saved in the Remote Desktop Client. | DISA Windows 11 STIG v1r5 | Windows | |
WN22-CC-000520 - Windows Server 2022 Windows Remote Management (WinRM) service must not store RunAs credentials. | DISA Windows Server 2022 STIG v1r1 | Windows | |
WN22-SO-000410 - Windows Server 2022 User Account Control (UAC) must automatically deny standard user requests for elevation. | DISA Windows Server 2022 STIG v1r4 | Windows | |
WN22-SO-000440 - Windows Server 2022 User Account Control (UAC) must run all administrators in Admin Approval Mode, enabling UAC. | DISA Windows Server 2022 STIG v1r3 | Windows | |
WN22-SO-000440 - Windows Server 2022 User Account Control (UAC) must run all administrators in Admin Approval Mode, enabling UAC. | DISA Windows Server 2022 STIG v1r4 | Windows | |