Name | Audit Name | Plugin | Category |
---|---|---|---|
5.2.14 Ensure only strong MAC algorithms are used - approved MAC algorithms | CIS Distribution Independent Linux Workstation L1 v2.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION |
5.2.14 Ensure only strong MAC algorithms are used - approved MAC algorithms | CIS Distribution Independent Linux Server L1 v2.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION |
5.2.14 Ensure only strong MAC algorithms are used - weak MAC algorithms | CIS Distribution Independent Linux Server L1 v2.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION |
5.2.14 Ensure only strong MAC algorithms are used - weak MAC algorithms | CIS Distribution Independent Linux Workstation L1 v2.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION |