3.1 Ensure 'FAILED_LOGIN_ATTEMPTS' Is Less than or Equal to '5' | CIS Oracle Server 19c DB Unified Auditing v1.2.0 | OracleDB | ACCESS CONTROL |
3.2 Ensure 'PASSWORD_LOCK_TIME' Is Greater than or Equal to '1' | CIS Oracle Server 19c DB Unified Auditing v1.2.0 | OracleDB | ACCESS CONTROL |
3.8 Ensure 'SESSIONS_PER_USER' Is Less than or Equal to '10' | CIS Oracle Server 19c DB Traditional Auditing v1.2.0 | OracleDB | ACCESS CONTROL |
3.12 (L1) Host must lock an account after a specified number of failed login attempts | CIS VMware ESXi 8.0 v1.2.0 L1 | VMware | ACCESS CONTROL |
4.4.2.1.2 Ensure password failed attempts lockout is configured | CIS Oracle Linux 7 v4.0.0 L1 Server | Unix | ACCESS CONTROL |
4.4.2.1.2 Ensure password failed attempts lockout is configured | CIS CentOS Linux 7 v4.0.0 L1 Server | Unix | ACCESS CONTROL |
4.4.2.1.4 Ensure password failed attempts lockout includes root account | CIS Red Hat Enterprise Linux 7 v4.0.0 L2 Workstation | Unix | ACCESS CONTROL |
4.5.2 Ensure lockout for failed password attempts is configured | CIS Amazon Linux 2023 Server L1 v1.0.0 | Unix | ACCESS CONTROL |
5.2.1 Ensure Password Account Lockout Threshold Is Configured | CIS Apple macOS 11.0 Big Sur v4.0.0 L1 | Unix | ACCESS CONTROL |
5.2.1 Ensure Password Account Lockout Threshold Is Configured | CIS Apple macOS 12.0 Monterey v4.0.0 L1 | Unix | ACCESS CONTROL |
5.3.2.1.1 Ensure password failed attempts lockout is configured | CIS Red Hat Enterprise Linux 10 v1.0.0 L1 Workstation | Unix | ACCESS CONTROL |
5.3.2.1.1 Ensure password failed attempts lockout is configured | CIS SUSE Linux Enterprise 15 v2.0.1 L1 Server | Unix | ACCESS CONTROL |
5.3.2.1.2 Ensure password unlock time is configured | CIS Red Hat Enterprise Linux 10 v1.0.0 L1 Workstation | Unix | ACCESS CONTROL |
5.3.2.1.3 Ensure password failed attempts lockout includes root account | CIS Red Hat Enterprise Linux 10 v1.0.0 L2 Workstation | Unix | ACCESS CONTROL |
5.3.2.1.3 Ensure password failed attempts lockout includes root account | CIS SUSE Linux Enterprise 15 v2.0.1 L2 Server | Unix | ACCESS CONTROL |
5.3.2.1.3 Ensure password failed attempts lockout includes root account | CIS Red Hat Enterprise Linux 10 v1.0.0 L2 Server | Unix | ACCESS CONTROL |
5.3.2.2 Ensure pam_faillock module is enabled | CIS Debian Linux 11 v2.0.0 L1 Server | Unix | ACCESS CONTROL |
5.3.2.2 Ensure pam_faillock module is enabled | CIS Debian Linux 11 v2.0.0 L1 Workstation | Unix | ACCESS CONTROL |
5.3.2.2 Ensure pam_faillock module is enabled | CIS Ubuntu Linux 22.04 LTS v2.0.0 L1 Server | Unix | ACCESS CONTROL |
5.3.2.2 Ensure pam_faillock module is enabled | CIS Ubuntu Linux 20.04 LTS v3.0.0 L1 Server | Unix | ACCESS CONTROL |
5.3.2.2 Ensure pam_faillock module is enabled | CIS Ubuntu Linux 20.04 LTS v3.0.0 L1 Workstation | Unix | ACCESS CONTROL |
5.3.3.1.1 Ensure password failed attempts lockout is configured | CIS Oracle Linux 8 v4.0.0 L1 Server | Unix | ACCESS CONTROL |
5.3.3.1.1 Ensure password failed attempts lockout is configured | CIS Debian Linux 11 v2.0.0 L1 Workstation | Unix | ACCESS CONTROL |
5.3.3.1.1 Ensure password failed attempts lockout is configured | CIS Ubuntu Linux 20.04 LTS v3.0.0 L1 Server | Unix | ACCESS CONTROL |
5.3.3.1.1 Ensure password failed attempts lockout is configured | CIS Rocky Linux 9 v2.0.0 L1 Server | Unix | ACCESS CONTROL |
5.3.3.1.1 Ensure password failed attempts lockout is configured | CIS Oracle Linux 9 v2.0.0 L1 Workstation | Unix | ACCESS CONTROL |
5.3.3.1.1 Ensure password failed attempts lockout is configured | CIS AlmaLinux OS 9 v2.0.0 L1 Workstation | Unix | ACCESS CONTROL |
5.3.3.1.1 Ensure password failed attempts lockout is configured | CIS AlmaLinux OS 8 v4.0.0 L1 Server | Unix | ACCESS CONTROL |
5.3.3.1.2 Ensure password unlock time is configured | CIS Debian Linux 12 v1.1.0 L1 Workstation | Unix | ACCESS CONTROL |
5.3.3.1.2 Ensure password unlock time is configured | CIS Oracle Linux 8 v4.0.0 L1 Workstation | Unix | ACCESS CONTROL |
5.3.3.1.2 Ensure password unlock time is configured | CIS Rocky Linux 8 v3.0.0 L1 Server | Unix | ACCESS CONTROL |
5.3.3.1.2 Ensure password unlock time is configured | CIS Red Hat Enterprise Linux 8 v4.0.0 L1 Server | Unix | ACCESS CONTROL |
5.3.3.1.2 Ensure password unlock time is configured | CIS AlmaLinux OS 8 v4.0.0 L1 Server | Unix | ACCESS CONTROL |
5.3.3.1.2 Ensure password unlock time is configured | CIS Red Hat Enterprise Linux 9 v2.0.0 L1 Workstation | Unix | ACCESS CONTROL |
5.3.3.1.2 Ensure password unlock time is configured | CIS Rocky Linux 9 v2.0.0 L1 Workstation | Unix | ACCESS CONTROL |
5.3.3.1.2 Ensure password unlock time is configured | CIS Debian Linux 11 v2.0.0 L1 Server | Unix | ACCESS CONTROL |
5.3.3.1.2 Ensure password unlock time is configured | CIS Debian Linux 11 v2.0.0 L1 Workstation | Unix | ACCESS CONTROL |
5.3.3.1.3 Ensure password failed attempts lockout includes root account | CIS Debian Linux 12 v1.1.0 L2 Workstation | Unix | ACCESS CONTROL |
5.3.3.1.3 Ensure password failed attempts lockout includes root account | CIS Rocky Linux 9 v2.0.0 L2 Workstation | Unix | ACCESS CONTROL |
5.3.3.1.3 Ensure password failed attempts lockout includes root account | CIS Red Hat Enterprise Linux 9 v2.0.0 L2 Workstation | Unix | ACCESS CONTROL |
5.3.3.1.3 Ensure password failed attempts lockout includes root account | CIS Oracle Linux 8 v4.0.0 L2 Server | Unix | ACCESS CONTROL |
5.3.3.1.3 Ensure password failed attempts lockout includes root account | CIS Oracle Linux 9 v2.0.0 L2 Workstation | Unix | ACCESS CONTROL |
5.3.3.1.3 Ensure password failed attempts lockout includes root account | CIS Red Hat Enterprise Linux 9 v2.0.0 L2 Server | Unix | ACCESS CONTROL |
5.3.3.1.3 Ensure password failed attempts lockout includes root account | CIS Rocky Linux 9 v2.0.0 L2 Server | Unix | ACCESS CONTROL |
5.3.3.1.3 Ensure password failed attempts lockout includes root account | CIS Red Hat Enterprise Linux 8 v4.0.0 L2 Server | Unix | ACCESS CONTROL |
5.3.3.1.18 Ensure the use of a non-default faillock tally directory while SELinux enforces a targeted policy | CIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIG | Unix | ACCESS CONTROL |
5.3.3.1.19 Ensure the use of a non-default faillock tally directory on the pam_faillock module while SELinux enforces a targeted policy | CIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIG | Unix | ACCESS CONTROL |
5.4.12 Ensure accounts lock for a minimum of 15 minutes after three unsuccessful logon attempts within a 15-minute timeframe | CIS Amazon Linux 2 STIG v2.0.0 STIG | Unix | ACCESS CONTROL |
5.5.2 Ensure lockout for failed password attempts is configured | CIS Fedora 28 Family Linux Workstation L1 v2.0.0 | Unix | ACCESS CONTROL |
5.5.2 Ensure lockout for failed password attempts is configured | CIS CentOS Linux 8 Workstation L1 v2.0.0 | Unix | ACCESS CONTROL |