1.2.22 Ensure that the --service-account-key-file argument is set as appropriate | CIS Kubernetes v1.10.0 L1 Master | Unix | IDENTIFICATION AND AUTHENTICATION |
1.2.24 Ensure that the --service-account-key-file argument is set as appropriate | CIS Kubernetes v1.23 Benchmark v1.0.1 L1 Master | Unix | IDENTIFICATION AND AUTHENTICATION |
1.3.4 Ensure that the --service-account-private-key-file argument is set as appropriate | CIS Kubernetes v1.24 Benchmark v1.0.0 L1 Master | Unix | IDENTIFICATION AND AUTHENTICATION |
2.4.2 Ensure 'Require alphanumeric value' is set to 'Enabled' | MobileIron - CIS Apple iOS 17 v1.1.0 End User Owned L2 | MDM | IDENTIFICATION AND AUTHENTICATION |
3.4.2 Ensure 'Require alphanumeric value' is set to 'Enabled' | MobileIron - CIS Apple iPadOS 17 Institutionally Owned L2 | MDM | IDENTIFICATION AND AUTHENTICATION |
4.1.6 Ensure 'Stolen Device Protection' Is Enabled | AirWatch - CIS Apple iOS 17 v1.1.0 End User Owned L2 | MDM | IDENTIFICATION AND AUTHENTICATION |
4.1.6 Ensure 'Stolen Device Protection' Is Enabled | AirWatch - CIS Apple iPadOS 17 v1.1.0 End User Owned L2 | MDM | IDENTIFICATION AND AUTHENTICATION |
4.2 (L1) Ensure passwords are required to be complex | CIS VMware ESXi 7.0 v1.5.0 L1 | VMware | IDENTIFICATION AND AUTHENTICATION |
4.5 (L1) Ensure previous 5 passwords are prohibited | CIS VMware ESXi 7.0 v1.5.0 L1 | VMware | IDENTIFICATION AND AUTHENTICATION |
5.1.19 Ensure sshd PermitEmptyPasswords is disabled | CIS Red Hat Enterprise Linux 9 v2.0.0 L1 Server | Unix | IDENTIFICATION AND AUTHENTICATION |
5.2.2 Ensure Password Minimum Length Is Configured | CIS Apple macOS 11.0 Big Sur v4.0.0 L1 | Unix | IDENTIFICATION AND AUTHENTICATION |
5.2.3 Ensure Complex Password Must Contain Alphabetic Characters Is Configured | CIS Apple macOS 10.14 v2.0.0 L2 | Unix | IDENTIFICATION AND AUTHENTICATION |
5.2.3 Ensure Complex Password Must Contain Alphabetic Characters Is Configured | CIS Apple macOS 11.0 Big Sur v4.0.0 L2 | Unix | IDENTIFICATION AND AUTHENTICATION |
5.2.4 Ensure Complex Password Must Contain Numeric Character Is Configured | CIS Apple macOS 10.14 v2.0.0 L2 | Unix | IDENTIFICATION AND AUTHENTICATION |
5.2.8 Ensure Password History Is Configured | CIS Apple macOS 10.15 Catalina v3.0.0 L1 | Unix | IDENTIFICATION AND AUTHENTICATION |
5.3.2.4 Ensure pam_pwhistory module is enabled | CIS Rocky Linux 9 v2.0.0 L1 Server | Unix | IDENTIFICATION AND AUTHENTICATION |
5.3.2.4 Ensure pam_pwhistory module is enabled | CIS Ubuntu Linux 22.04 LTS v2.0.0 L1 Server | Unix | IDENTIFICATION AND AUTHENTICATION |
5.3.3.2.1 Ensure password number of changed characters is configured | CIS Rocky Linux 9 v2.0.0 L1 Workstation | Unix | IDENTIFICATION AND AUTHENTICATION |
5.3.3.2.2 Ensure minimum password length is configured | CIS Ubuntu Linux 22.04 LTS v2.0.0 L1 Workstation | Unix | IDENTIFICATION AND AUTHENTICATION |
5.3.3.2.3 Ensure password complexity is configured | CIS Rocky Linux 9 v2.0.0 L1 Workstation | Unix | IDENTIFICATION AND AUTHENTICATION |
5.3.3.2.4 Ensure password same consecutive characters is configured | CIS Red Hat Enterprise Linux 9 v2.0.0 L1 Workstation | Unix | IDENTIFICATION AND AUTHENTICATION |
5.3.3.2.4 Ensure password same consecutive characters is configured | CIS Rocky Linux 9 v2.0.0 L1 Server | Unix | IDENTIFICATION AND AUTHENTICATION |
5.3.3.2.4 Ensure password same consecutive characters is configured | CIS Rocky Linux 9 v2.0.0 L1 Workstation | Unix | IDENTIFICATION AND AUTHENTICATION |
5.3.3.2.5 Ensure password maximum sequential characters is configured | CIS Red Hat Enterprise Linux 9 v2.0.0 L1 Server | Unix | IDENTIFICATION AND AUTHENTICATION |
5.3.3.2.5 Ensure password maximum sequential characters is configured | CIS Rocky Linux 9 v2.0.0 L1 Workstation | Unix | IDENTIFICATION AND AUTHENTICATION |
5.3.3.2.5 Ensure password maximum sequential characters is configured | CIS Ubuntu Linux 22.04 LTS v2.0.0 L1 Server | Unix | IDENTIFICATION AND AUTHENTICATION |
5.3.3.2.6 Ensure password dictionary check is enabled | CIS Red Hat Enterprise Linux 9 v2.0.0 L1 Workstation | Unix | IDENTIFICATION AND AUTHENTICATION |
5.3.3.3.1 Ensure password history remember is configured | CIS Rocky Linux 9 v2.0.0 L1 Server | Unix | IDENTIFICATION AND AUTHENTICATION |
5.3.3.3.1 Ensure password history remember is configured | CIS Rocky Linux 9 v2.0.0 L1 Workstation | Unix | IDENTIFICATION AND AUTHENTICATION |
5.3.3.3.1 Ensure password history remember is configured | CIS Ubuntu Linux 22.04 LTS v2.0.0 L1 Server | Unix | IDENTIFICATION AND AUTHENTICATION |
5.3.3.3.2 Ensure password history is enforced for the root user | CIS Rocky Linux 9 v2.0.0 L1 Server | Unix | IDENTIFICATION AND AUTHENTICATION |
5.3.3.3.2 Ensure password history is enforced for the root user | CIS Ubuntu Linux 22.04 LTS v2.0.0 L1 Server | Unix | IDENTIFICATION AND AUTHENTICATION |
5.3.3.3.2 Ensure password history is enforced for the root user | CIS Ubuntu Linux 22.04 LTS v2.0.0 L1 Workstation | Unix | IDENTIFICATION AND AUTHENTICATION |
5.3.3.4.1 Ensure pam_unix does not include nullok | CIS Red Hat Enterprise Linux 9 v2.0.0 L1 Workstation | Unix | IDENTIFICATION AND AUTHENTICATION |
5.3.3.4.2 Ensure pam_unix does not include remember | CIS Ubuntu Linux 22.04 LTS v2.0.0 L1 Server | Unix | IDENTIFICATION AND AUTHENTICATION |
5.4.1.2 Ensure minimum days between password changes is 7 or more - users | CIS Aliyun Linux 2 L1 v1.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
5.5.1.5 Ensure all users last password change date is in the past | CIS CentOS 6 Workstation L1 v3.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
5.9 Ensure Users' Accounts Do Not Have a Password Hint | CIS Apple macOS 10.15 Catalina v3.0.0 L1 | Unix | IDENTIFICATION AND AUTHENTICATION |
5.18 Create specialized keychains for different purposes | CIS Apple macOS 10.13 L2 v1.1.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
6.2.1 Ensure password fields are not empty | CIS Aliyun Linux 2 L1 v1.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
7.2.2 Ensure /etc/shadow password fields are not empty | CIS Red Hat Enterprise Linux 9 v2.0.0 L1 Server | Unix | IDENTIFICATION AND AUTHENTICATION |
Big Sur - Encrypt Stored Passwords | NIST macOS Big Sur v1.4.0 - 800-53r5 Moderate | Unix | IDENTIFICATION AND AUTHENTICATION |
Big Sur - Encrypt Stored Passwords | NIST macOS Big Sur v1.4.0 - All Profiles | Unix | IDENTIFICATION AND AUTHENTICATION |
Catalina - Encrypt Stored Passwords | NIST macOS Catalina v1.5.0 - 800-53r5 High | Unix | IDENTIFICATION AND AUTHENTICATION |
Monterey - Encrypt Stored Passwords | NIST macOS Monterey v1.0.0 - 800-53r4 Moderate | Unix | IDENTIFICATION AND AUTHENTICATION |
Monterey - Encrypt Stored Passwords | NIST macOS Monterey v1.0.0 - All Profiles | Unix | IDENTIFICATION AND AUTHENTICATION |
Monterey - Prohibit Password Reuse for a Minimum of Five Generations | NIST macOS Monterey v1.0.0 - 800-53r4 High | Unix | IDENTIFICATION AND AUTHENTICATION |
Monterey - Prohibit Password Reuse for a Minimum of Five Generations | NIST macOS Monterey v1.0.0 - 800-53r4 Moderate | Unix | IDENTIFICATION AND AUTHENTICATION |
Monterey - Prohibit Password Reuse for a Minimum of Five Generations | NIST macOS Monterey v1.0.0 - All Profiles | Unix | IDENTIFICATION AND AUTHENTICATION |
Monterey - Prohibit Password Reuse for a Minimum of Five Generations | NIST macOS Monterey v1.0.0 - CNSSI 1253 | Unix | IDENTIFICATION AND AUTHENTICATION |