1.4 Ensure Check for Password Reuse is selected and History Length is set to 12 or more - history-checking | CIS Check Point Firewall L1 v1.1.0 | CheckPoint | IDENTIFICATION AND AUTHENTICATION |
1.4 Ensure Check for Password Reuse is selected and History Length is set to 12 or more - history-length | CIS Check Point Firewall L1 v1.1.0 | CheckPoint | IDENTIFICATION AND AUTHENTICATION |
2.1.2 - MobileIron - Enable 'Require alphanumeric value' | MobileIron - CIS Google Android 4 v1.0.0 L2 | MDM | IDENTIFICATION AND AUTHENTICATION |
2.1.3 - AirWatch - Set the 'minimum password length' | AirWatch - CIS Google Android 4 v1.0.0 L1 | MDM | IDENTIFICATION AND AUTHENTICATION |
2.2.3 - MobileIron - Require alphanumeric value | MobileIron - CIS Apple iOS 8 v1.0.0 L2 | MDM | IDENTIFICATION AND AUTHENTICATION |
2.2.3 - MobileIron - Require alphanumeric value | MobileIron - CIS Apple iOS 9 v1.0.0 L2 | MDM | IDENTIFICATION AND AUTHENTICATION |
2.2.5 - AirWatch - Set Minimum number of complex characters | AirWatch - CIS Apple iOS 9 v1.0.0 L2 | MDM | IDENTIFICATION AND AUTHENTICATION |
2.6 Ensure 'password_lifetime' is Less Than or Equal to '365' | CIS MariaDB 10.6 Database L1 v1.1.0 | MySQLDB | IDENTIFICATION AND AUTHENTICATION |
3.1.3 - AirWatch - Set the 'minimum password length' | AirWatch - CIS Apple iOS 9 v1.0.0 L1 | MDM | IDENTIFICATION AND AUTHENTICATION |
4.1 Ensure 'MUST_CHANGE' Option is set to 'ON' for All SQL Authenticated Logins | CIS SQL Server 2022 Database L1 DB v1.1.0 | MS_SQLDB | IDENTIFICATION AND AUTHENTICATION |
5.2.7 Password Age | CIS Apple macOS 10.12 L1 v1.2.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
5.2.11 Ensure SSH PermitEmptyPasswords is disabled | CIS Debian 9 Workstation L1 v1.0.1 | Unix | IDENTIFICATION AND AUTHENTICATION |
5.6 Ensure Automatic Login Is Disabled | CIS Apple macOS 10.15 Catalina v3.0.0 L1 | Unix | IDENTIFICATION AND AUTHENTICATION |
5.7 Enable OCSP and CRL certificate checking - CRLStyle | CIS Apple macOS 10.12 L2 v1.2.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
6.4.1 Ensure Authentication is configured for Diagnostic Ports | CIS Juniper OS Benchmark v2.1.0 L1 | Juniper | IDENTIFICATION AND AUTHENTICATION |
7.1 Set Password Expiration Parameters on Active Accounts - logins | CIS Solaris 11 L1 v1.1.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
7.2 Set Strong Password Creation Policies - MINALPHA = 2 | CIS Solaris 11.2 L1 v1.1.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
7.2 Set Strong Password Creation Policies - MINNONALPHA = 1 | CIS Solaris 11.2 L1 v1.1.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
7.2 Set Strong Password Creation Policies - DICTIONLIST = /usr/share/lib/dict/words | CIS Solaris 11.1 L1 v1.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
7.2 Set Strong Password Creation Policies - NAMECHECK = yes | CIS Solaris 11.1 L1 v1.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
7.3 Set Strong Password Creation Policies - Check HISTORY is set to 10 | CIS Solaris 10 L1 v5.2 | Unix | IDENTIFICATION AND AUTHENTICATION |
9.2.1 Set Password Creation Requirement Parameters Using pam_cracklib - ocredit | CIS Debian Linux 7 L1 v1.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
9.4 Ensure Password Fields are Not Empty | CIS Solaris 11.1 L1 v1.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
9.8 Check Permissions on User '.' (Hidden) Files | CIS Solaris 11.1 L1 v1.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
10.1.1 Set Password Expiration Days | CIS Debian Linux 7 L1 v1.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
Big Sur - Require a Minimum Password Length of 15 Characters | NIST macOS Big Sur v1.4.0 - 800-53r4 Low | Unix | IDENTIFICATION AND AUTHENTICATION |
Big Sur - Require Passwords Contain a Minimum of One Special Character | NIST macOS Big Sur v1.4.0 - 800-53r4 High | Unix | IDENTIFICATION AND AUTHENTICATION |
Big Sur - Restrict Maximum Password Lifetime to 60 Days | NIST macOS Big Sur v1.4.0 - 800-53r4 High | Unix | IDENTIFICATION AND AUTHENTICATION |
Big Sur - Restrict Maximum Password Lifetime to 60 Days | NIST macOS Big Sur v1.4.0 - 800-53r5 High | Unix | IDENTIFICATION AND AUTHENTICATION |
Catalina - Require a Minimum Password Length of 15 Characters | NIST macOS Catalina v1.5.0 - 800-53r5 Low | Unix | IDENTIFICATION AND AUTHENTICATION |
Catalina - Require Passwords Contain a Minimum of One Numeric Character | NIST macOS Catalina v1.5.0 - All Profiles | Unix | IDENTIFICATION AND AUTHENTICATION |
Catalina - Require Passwords Contain a Minimum of One Special Character | NIST macOS Catalina v1.5.0 - 800-53r5 Low | Unix | IDENTIFICATION AND AUTHENTICATION |
Catalina - Require Passwords Contain a Minimum of One Special Character | NIST macOS Catalina v1.5.0 - 800-53r5 Moderate | Unix | IDENTIFICATION AND AUTHENTICATION |
Catalina - Restrict Maximum Password Lifetime to 60 Days | NIST macOS Catalina v1.5.0 - 800-53r5 High | Unix | IDENTIFICATION AND AUTHENTICATION |
Catalina - Restrict Maximum Password Lifetime to 60 Days | NIST macOS Catalina v1.5.0 - All Profiles | Unix | IDENTIFICATION AND AUTHENTICATION |
IBM i : Block Password Change (QPWDCHGBLK) - '>=48' | IBM System i Security Reference for V7R1 and V6R1 | AS/400 | IDENTIFICATION AND AUTHENTICATION |
IBM i : Maximum Length of Passwords (QPWDMAXLEN) - '>=8' | IBM System i Security Reference for V7R2 | AS/400 | IDENTIFICATION AND AUTHENTICATION |
IBM i : Minimum Length of Passwords (QPWDMINLEN) - '>=6' | IBM System i Security Reference for V7R1 and V6R1 | AS/400 | IDENTIFICATION AND AUTHENTICATION |
IBM i : Password Expiration Interval (QPWDEXPITV) - '30 to 90' | IBM System i Security Reference for V7R3 | AS/400 | IDENTIFICATION AND AUTHENTICATION |
IBM i : Password Expiration Interval (QPWDEXPITV) - '90' | IBM System i Security Reference for V7R1 and V6R1 | AS/400 | IDENTIFICATION AND AUTHENTICATION |
IBM i : Password Level (QPWDLVL) - '>=0' | IBM System i Security Reference for V7R1 and V6R1 | AS/400 | IDENTIFICATION AND AUTHENTICATION |
IBM i : Required Difference in Passwords (QPWDRQDDIF) - '<=5' | IBM System i Security Reference for V7R2 | AS/400 | IDENTIFICATION AND AUTHENTICATION |
IBM i : Requirement for Numeric Character in Passwords (QPWDRQDDGT) - '1' | IBM System i Security Reference for V7R3 | AS/400 | IDENTIFICATION AND AUTHENTICATION |
IBM i : Restricted Characters for Passwords (QPWDLMTCHR) | IBM System i Security Reference for V7R1 and V6R1 | AS/400 | IDENTIFICATION AND AUTHENTICATION |
IBM i : Restriction of Repeated Characters for Passwords (QPWDLMTREP) - '1' | IBM System i Security Reference for V7R2 | AS/400 | IDENTIFICATION AND AUTHENTICATION |
Routing Protocol Security - Periodically change route authentication keys in accordance with your organization's security policy | Juniper Hardening JunOS 12 Devices Checklist | Juniper | IDENTIFICATION AND AUTHENTICATION |
Storing credentials in the switch configuration | ArubaOS Switch 16.x Hardening Guide v1.0.0 | ArubaOS | IDENTIFICATION AND AUTHENTICATION |
User Authentication Security - Configure a password complexity policy - all character-sets are enforced | Juniper Hardening JunOS 12 Devices Checklist | Juniper | IDENTIFICATION AND AUTHENTICATION |
User Authentication Security - Configure a password complexity policy - character-sets are enforced | Juniper Hardening JunOS 12 Devices Checklist | Juniper | IDENTIFICATION AND AUTHENTICATION |
User Authentication Security - Ensure the root account has been configured with a strong password | Juniper Hardening JunOS 12 Devices Checklist | Juniper | IDENTIFICATION AND AUTHENTICATION |