2.2 Ensure Basic Registry and Quick Start security Registry are Removed | CIS IBM WebSphere Liberty v1.0.0 L1 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
3.19 (L1) Host must have an accurate Exception Users list | CIS VMware ESXi 8.0 v1.2.0 L1 | VMware | ACCESS CONTROL, MEDIA PROTECTION |
4.7 Ensure the Exception Users list is properly configured | CIS VMware ESXi 6.7 v1.3.0 Level 1 | VMware | ACCESS CONTROL, MEDIA PROTECTION |
4.8 (L1) Ensure the Exception Users list is properly configured | CIS VMware ESXi 7.0 v1.5.0 L1 | VMware | ACCESS CONTROL, MEDIA PROTECTION |
ALMA-09-006845 - AlmaLinux OS 9 must have the postfix package installed. | DISA CloudLinux AlmaLinux OS 9 STIG v1r2 | Unix | ACCESS CONTROL |
APPL-11-000032 - The macOS system must be configured with dedicated user accounts to decrypt the hard disk upon startup - UserShell | DISA STIG Apple macOS 11 v1r5 | Unix | ACCESS CONTROL |
APPL-11-000032 - The macOS system must be configured with dedicated user accounts to decrypt the hard disk upon startup - UserShell | DISA STIG Apple macOS 11 v1r8 | Unix | ACCESS CONTROL |
APPL-12-000033 - The macOS system must be configured to disable password forwarding for FileVault2. | DISA STIG Apple macOS 12 v1r9 | Unix | ACCESS CONTROL |
CASA-ND-000110 - The Cisco ASA must be configured to automatically audit account-disabling actions. | DISA STIG Cisco ASA NDM v2r2 | Cisco | ACCESS CONTROL |
CD12-00-000500 - PostgreSQL must integrate with an organization-level authentication/access mechanism providing account management and automation for all users, groups, roles, and any other principals. | DISA STIG Crunchy Data PostgreSQL OS v3r1 | Unix | ACCESS CONTROL |
CNTR-K8-000220 - The Kubernetes Controller Manager must create unique service accounts for each work payload. | DISA STIG Kubernetes v2r3 | Unix | ACCESS CONTROL |
CNTR-R2-000030 - RKE2 must use a centralized user management solution to support account management functions. | DISA Rancher Government Solutions RKE2 STIG v2r3 | Unix | ACCESS CONTROL |
FGFW-ND-000020 - The FortiGate device must automatically audit account removal actions | DISA Fortigate Firewall NDM STIG v1r4 | FortiGate | ACCESS CONTROL |
MADB-10-000200 - MariaDB must integrate with an organization-level authentication/access mechanism providing account management and automation for all users, groups, roles, and any other principals. | DISA MariaDB Enterprise 10.x v2r3 DB | MySQLDB | ACCESS CONTROL |
MD4X-00-001600 - MongoDB must integrate with an organization-level authentication/access mechanism providing account management and automation for all users, groups, roles, and any other principals. | DISA STIG MongoDB Enterprise Advanced 4.x v1r4 OS | Unix | ACCESS CONTROL |
O19C-00-000800 - Oracle Database must integrate with an organization-level authentication/access mechanism providing account management and automation for all users, groups, roles, and any other principals. | DISA Oracle Database 19c STIG v1r1 Database | OracleDB | ACCESS CONTROL |
OL08-00-020270 - OL 8 must automatically expire temporary accounts within 72 hours. | DISA Oracle Linux 8 STIG v2r4 | Unix | ACCESS CONTROL |
PHTN-30-000044 - The Photon operating system must audit all account disabling actions. | DISA STIG VMware vSphere 7.0 Photon OS v1r4 | Unix | ACCESS CONTROL |
PHTN-40-000076 The Photon operating system must audit all account modifications. | DISA VMware vSphere 8.0 vCenter Appliance Photon OS 4.0 STIG v2r1 | Unix | ACCESS CONTROL |
PHTN-67-000001 - The Photon operating system must audit all account creations - useradd | DISA STIG VMware vSphere 6.7 Photon OS v1r6 | Unix | ACCESS CONTROL |
PHTN-67-000046 - The Photon operating system must audit all account disabling actions. | DISA STIG VMware vSphere 6.7 Photon OS v1r6 | Unix | ACCESS CONTROL |
PHTN-67-000047 - The Photon operating system must audit all account removal actions - groupdel | DISA STIG VMware vSphere 6.7 Photon OS v1r6 | Unix | ACCESS CONTROL |
SLES-12-010331 - The SUSE operating system must automatically expire temporary accounts within 72 hours. | DISA SLES 12 STIG v3r2 | Unix | ACCESS CONTROL |
SLES-15-020060 - The SUSE operating system must never automatically remove or disable emergency administrator accounts. | DISA SUSE Linux Enterprise Server 15 STIG v2r4 | Unix | ACCESS CONTROL |
SLES-15-020061 - The SUSE operating system must automatically expire temporary accounts within 72 hours. | DISA SUSE Linux Enterprise Server 15 STIG v2r4 | Unix | ACCESS CONTROL |
SQL2-00-001900 - SQL Server must automatically audit account modification - 'Event ID 14' | DISA STIG SQL Server 2012 DB Instance Security v1r20 | MS_SQLDB | ACCESS CONTROL |
SQL2-00-001900 - SQL Server must automatically audit account modification - 'Event ID 15' | DISA STIG SQL Server 2012 DB Instance Security v1r20 | MS_SQLDB | ACCESS CONTROL |
SQL2-00-001900 - SQL Server must automatically audit account modification - 'Event ID 107' | DISA STIG SQL Server 2012 DB Instance Security v1r20 | MS_SQLDB | ACCESS CONTROL |
SQL2-00-001900 - SQL Server must automatically audit account modification - 'Event ID 108' | DISA STIG SQL Server 2012 DB Instance Security v1r20 | MS_SQLDB | ACCESS CONTROL |
SQL2-00-001900 - SQL Server must automatically audit account modification - 'Event ID 109' | DISA STIG SQL Server 2012 DB Instance Security v1r20 | MS_SQLDB | ACCESS CONTROL |
SQL2-00-001900 - SQL Server must automatically audit account modification - 'Event ID 112' | DISA STIG SQL Server 2012 DB Instance Security v1r20 | MS_SQLDB | ACCESS CONTROL |
SQL2-00-001900 - SQL Server must automatically audit account modification - 'Event ID 115' | DISA STIG SQL Server 2012 DB Instance Security v1r20 | MS_SQLDB | ACCESS CONTROL |
SQL2-00-001900 - SQL Server must automatically audit account modification - 'Event ID 117' | DISA STIG SQL Server 2012 DB Instance Security v1r20 | MS_SQLDB | ACCESS CONTROL |
SQL2-00-001900 - SQL Server must automatically audit account modification - 'Event ID 118' | DISA STIG SQL Server 2012 DB Instance Security v1r20 | MS_SQLDB | ACCESS CONTROL |
SQL2-00-001900 - SQL Server must automatically audit account modification - 'Event ID 129' | DISA STIG SQL Server 2012 DB Instance Security v1r20 | MS_SQLDB | ACCESS CONTROL |
SQL2-00-001900 - SQL Server must automatically audit account modification - 'Event ID 131' | DISA STIG SQL Server 2012 DB Instance Security v1r20 | MS_SQLDB | ACCESS CONTROL |
SQL2-00-001900 - SQL Server must automatically audit account modification - 'Event ID 132' | DISA STIG SQL Server 2012 DB Instance Security v1r20 | MS_SQLDB | ACCESS CONTROL |
SQL2-00-001900 - SQL Server must automatically audit account modification - 'Event ID 153' | DISA STIG SQL Server 2012 DB Instance Security v1r20 | MS_SQLDB | ACCESS CONTROL |
SQL2-00-001900 - SQL Server must automatically audit account modification - 'Event ID 171' | DISA STIG SQL Server 2012 DB Instance Security v1r20 | MS_SQLDB | ACCESS CONTROL |
SQL2-00-001900 - SQL Server must automatically audit account modification - 'Event ID 176' | DISA STIG SQL Server 2012 DB Instance Security v1r20 | MS_SQLDB | ACCESS CONTROL |
SQL2-00-001900 - SQL Server must automatically audit account modification - 'Event ID 177' | DISA STIG SQL Server 2012 DB Instance Security v1r20 | MS_SQLDB | ACCESS CONTROL |
SQL2-00-023300 - SQL Server must notify appropriate individuals when accounts are modified - 'Event ID 18' | DISA STIG SQL Server 2012 DB Instance Security v1r20 | MS_SQLDB | ACCESS CONTROL |
SQL2-00-023300 - SQL Server must notify appropriate individuals when accounts are modified - 'Event ID 20' | DISA STIG SQL Server 2012 DB Instance Security v1r20 | MS_SQLDB | ACCESS CONTROL |
SQL2-00-023300 - SQL Server must notify appropriate individuals when accounts are modified - 'Event ID 102' | DISA STIG SQL Server 2012 DB Instance Security v1r20 | MS_SQLDB | ACCESS CONTROL |
SQL2-00-023300 - SQL Server must notify appropriate individuals when accounts are modified - 'Event ID 109' | DISA STIG SQL Server 2012 DB Instance Security v1r20 | MS_SQLDB | ACCESS CONTROL |
UBTU-20-010000 - The Ubuntu operating system must provision temporary user accounts with an expiration time of 72 hours or less. | DISA Canonical Ubuntu 20.04 LTS STIG v2r2 | Unix | ACCESS CONTROL |
UBTU-20-010410 - The Ubuntu operating system must automatically expire temporary accounts within 72 hours. | DISA Canonical Ubuntu 20.04 LTS STIG v2r2 | Unix | ACCESS CONTROL |
WN11-AU-000040 - The system must be configured to audit Account Management - User Account Management successes. | DISA Microsoft Windows 11 STIG v2r3 | Windows | ACCESS CONTROL |
WN22-00-000300 - Windows Server 2022 must automatically remove or disable temporary user accounts after 72 hours. | DISA Microsoft Windows Server 2022 STIG v2r4 | Windows | ACCESS CONTROL |
WN22-00-000310 - Windows Server 2022 must automatically remove or disable emergency accounts after the crisis is resolved or within 72 hours. | DISA Microsoft Windows Server 2022 STIG v2r4 | Windows | ACCESS CONTROL |