1.2.27 Ensure that the --service-account-key-file argument is set as appropriate | CIS Kubernetes v1.20 Benchmark v1.0.1 L1 Master | Unix | IDENTIFICATION AND AUTHENTICATION |
1.3.4 Ensure that the --service-account-private-key-file argument is set as appropriate | CIS Kubernetes v1.23 Benchmark v1.0.1 L1 Master | Unix | IDENTIFICATION AND AUTHENTICATION |
1.3.7 Ensure that the RotateKubeletServerCertificate argument is set to true | CIS Kubernetes 1.7.0 Benchmark v1.1.0 L1 | Unix | IDENTIFICATION AND AUTHENTICATION |
2.4.3 Ensure 'Minimum passcode length' is set to a value of '6' or greater | AirWatch - CIS Apple iOS 17 Benchmark v1.1.0 End User Owned L1 | MDM | IDENTIFICATION AND AUTHENTICATION |
2.6 Ensure that the --peer-auto-tls argument is not set to true | CIS Kubernetes v1.23 Benchmark v1.0.1 L1 Master | Unix | IDENTIFICATION AND AUTHENTICATION |
3.4.1 Ensure 'Allow simple value' is set to 'Disabled' | AirWatch - CIS Apple iOS 17 Institution Owned L1 | MDM | IDENTIFICATION AND AUTHENTICATION |
3.4.1 Ensure 'Allow simple value' is set to 'Disabled' | MobileIron - CIS Apple iPadOS 17 Institutionally Owned L1 | MDM | IDENTIFICATION AND AUTHENTICATION |
3.4.2 Ensure 'Require alphanumeric value' is set to 'Enabled' | MobileIron - CIS Apple iOS 17 Institution Owned L2 | MDM | IDENTIFICATION AND AUTHENTICATION |
3.4.3 Ensure 'Minimum passcode length' is set to a value of '6' or greater | AirWatch - CIS Apple iOS 17 Institution Owned L1 | MDM | IDENTIFICATION AND AUTHENTICATION |
4.2.2 histsize | CIS IBM AIX 7.1 L1 v2.1.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
4.2.7 minalpha | CIS IBM AIX 7.1 L1 v2.1.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
4.2.9 mindigit | CIS IBM AIX 7.1 L1 v2.1.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
4.2.13 minspecialchar | CIS IBM AIX 7.1 L1 v2.1.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
4.6.1.4 Ensure inactive password lock is 30 days or less | CIS Amazon Linux 2023 Server L1 v1.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
5.1.13 Ensure sshd IgnoreRhosts is enabled | CIS Rocky Linux 8 v3.0.0 L1 Server | Unix | IDENTIFICATION AND AUTHENTICATION |
5.1.20 Ensure sshd PermitEmptyPasswords is disabled | CIS Red Hat Enterprise Linux 8 STIG v2.0.0 L1 Server | Unix | IDENTIFICATION AND AUTHENTICATION |
5.2.2 Ensure Password Minimum Length Is Configured | CIS Apple macOS 10.14 v2.0.0 L1 | Unix | IDENTIFICATION AND AUTHENTICATION |
5.2.5 Ensure Complex Password Must Contain Special Character Is Configured | CIS Apple macOS 11.0 Big Sur v4.0.0 L2 | Unix | IDENTIFICATION AND AUTHENTICATION |
5.2.6 Ensure Complex Password Must Contain Uppercase and Lowercase Characters Is Configured | CIS Apple macOS 10.15 Catalina v3.0.0 L2 | Unix | IDENTIFICATION AND AUTHENTICATION |
5.2.8 Ensure Password History Is Configured | CIS Apple macOS 10.14 v2.0.0 L1 | Unix | IDENTIFICATION AND AUTHENTICATION |
5.3.1 Ensure password creation requirements are configured - dcredit | CIS Debian 9 Server L1 v1.0.1 | Unix | IDENTIFICATION AND AUTHENTICATION |
5.3.1 Ensure password creation requirements are configured - dcredit | CIS Debian 9 Workstation L1 v1.0.1 | Unix | IDENTIFICATION AND AUTHENTICATION |
5.3.1 Ensure password creation requirements are configured - lcredit | CIS Aliyun Linux 2 L1 v1.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
5.3.1 Ensure password creation requirements are configured - try_first_pass | CIS Aliyun Linux 2 L1 v1.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
5.3.1 Ensure password creation requirements are configured - ucredit | CIS Debian 9 Server L1 v1.0.1 | Unix | IDENTIFICATION AND AUTHENTICATION |
5.3.3 Ensure password reuse is limited - system-auth | CIS Aliyun Linux 2 L1 v1.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
5.3.3.2.2 Ensure password length is configured | CIS Rocky Linux 8 v3.0.0 L1 Workstation | Unix | IDENTIFICATION AND AUTHENTICATION |
5.3.3.2.3 Ensure password complexity is configured | CIS Red Hat Enterprise Linux 8 STIG v2.0.0 L1 Workstation | Unix | IDENTIFICATION AND AUTHENTICATION |
5.3.3.2.5 Ensure password maximum sequential characters is configured | CIS Rocky Linux 8 v3.0.0 L1 Workstation | Unix | IDENTIFICATION AND AUTHENTICATION |
5.3.3.2.7 Ensure password quality is enforced for the root user | CIS Red Hat Enterprise Linux 8 STIG v2.0.0 L1 Server | Unix | IDENTIFICATION AND AUTHENTICATION |
5.3.3.2.19 Ensure retry is configured in /etc/security/pwquality.conf | CIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIG | Unix | IDENTIFICATION AND AUTHENTICATION |
5.3.3.3.1 Ensure password history remember is configured | CIS Rocky Linux 8 v3.0.0 L1 Server | Unix | IDENTIFICATION AND AUTHENTICATION |
5.3.3.3.2 Ensure password history is enforced for the root user | CIS Rocky Linux 8 v3.0.0 L1 Workstation | Unix | IDENTIFICATION AND AUTHENTICATION |
5.3.3.3.5 Ensure remember is configured on the pam_pwhistory module in /etc/pam.d/system-auth | CIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIG | Unix | IDENTIFICATION AND AUTHENTICATION |
5.3.3.4.2 Ensure pam_unix does not include remember | CIS Rocky Linux 8 v3.0.0 L1 Server | Unix | IDENTIFICATION AND AUTHENTICATION |
5.3.3.4.2 Ensure pam_unix does not include remember | CIS Rocky Linux 8 v3.0.0 L1 Workstation | Unix | IDENTIFICATION AND AUTHENTICATION |
5.4.1.1 Ensure password expiration is 365 days or less - login.defs | CIS Debian Family Server L1 v1.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
5.4.1.1 Ensure password expiration is 365 days or less - users | CIS Aliyun Linux 2 L1 v1.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
5.4.1.1 Ensure password expiration is configured | CIS Red Hat Enterprise Linux 8 STIG v2.0.0 L1 Server | Unix | IDENTIFICATION AND AUTHENTICATION |
5.4.1.2 Ensure minimum days between password changes is 7 or more - login.defs | CIS Aliyun Linux 2 L1 v1.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
5.4.1.2 Ensure minimum password days is configured | CIS Red Hat Enterprise Linux 8 v4.0.0 L2 Workstation | Unix | IDENTIFICATION AND AUTHENTICATION |
5.4.1.2 Ensure minimum password days is configured | CIS Red Hat Enterprise Linux 8 STIG v2.0.0 L2 Server | Unix | IDENTIFICATION AND AUTHENTICATION |
5.4.1.5 Ensure all users last password change date is in the past | CIS Debian Family Server L1 v1.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
5.5.1.2 Ensure minimum days between password changes is configured - /etc/login.defs | CIS CentOS 6 Server L1 v3.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
5.19 Create specialized keychains for different purposes | CIS Apple macOS 10.12 L2 v1.2.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
6.2.2 Ensure /etc/shadow password fields are not empty | CIS Amazon Linux 2023 Server L1 v1.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
6.9.1 Ensure a complex Root Password is Set | CIS Juniper OS Benchmark v2.1.0 L1 | Juniper | IDENTIFICATION AND AUTHENTICATION |
7.1.14 Ensure there are no ".shosts" files on the operating system | CIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIG | Unix | IDENTIFICATION AND AUTHENTICATION |
7.1.15 Ensure there are no "shosts.equiv" files on the operating system | CIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIG | Unix | IDENTIFICATION AND AUTHENTICATION |
7.2.2 Ensure /etc/shadow password fields are not empty | CIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIG | Unix | IDENTIFICATION AND AUTHENTICATION |