Item Search

NameAudit NamePluginCategory
1.1.2 Ensure 'Maximum password age' is set to '60 or fewer days, but not 0'CIS Microsoft Windows Server 2019 STIG MS STIG v1.0.1Windows

ACCESS CONTROL

1.1.3 Ensure 'Minimum password age' is set to '1 or more day(s)'CIS Microsoft Windows Server 2019 STIG MS L1 v1.0.1Windows

ACCESS CONTROL

1.1.3 Ensure 'Minimum password age' is set to '1 or more day(s)'CIS Microsoft Windows Server 2019 STIG MS STIG v1.0.1Windows

ACCESS CONTROL

1.1.4 Ensure 'Minimum password age' is set to '1 or more day(s)'CIS Microsoft Windows Server 2016 STIG MS STIG v1.1.0Windows

ACCESS CONTROL

1.1.4 Ensure 'Minimum password age' is set to '1 or more day(s)'CIS Microsoft Windows Server 2016 STIG DC STIG v1.1.0Windows

ACCESS CONTROL

2.3.1.1 Ensure 'Accounts: Administrator account status' is set to 'Disabled' (MS only)CIS Microsoft Windows Server 2016 STIG MS L1 v1.1.0Windows

ACCESS CONTROL

2.7 Lock Out Accounts if Not Currently in UseCIS MariaDB 10.6 Database L2 v1.1.0MySQLDB

ACCESS CONTROL

2.13 Ensure the 'sa' Login Account is set to 'Disabled'CIS SQL Server 2022 Database L1 DB v1.1.0MS_SQLDB

ACCESS CONTROL

2.13 Ensure the 'sa' Login Account is set to 'Disabled'CIS SQL Server 2019 Database L1 AWS RDS v1.3.0MS_SQLDB

ACCESS CONTROL

3.3 Ensure 'Orphaned Users' are Dropped From SQL Server DatabasesCIS SQL Server 2022 Database L1 DB v1.1.0MS_SQLDB

ACCESS CONTROL

3.3 Ensure 'Orphaned Users' are Dropped From SQL Server DatabasesCIS SQL Server 2019 Database L1 AWS RDS v1.3.0MS_SQLDB

ACCESS CONTROL

3.3 Ensure the Apache User Account Is LockedCIS Apache HTTP Server 2.4 L1 v2.1.0Unix

ACCESS CONTROL

4.2 Ensure 'CHECK_EXPIRATION' Option is set to 'ON' for All SQL Authenticated Logins Within the Sysadmin RoleCIS SQL Server 2022 Database L1 AWS RDS v1.1.0MS_SQLDB

ACCESS CONTROL

4.2 Ensure 'CHECK_EXPIRATION' Option is set to 'ON' for All SQL Authenticated Logins Within the Sysadmin RoleCIS SQL Server 2022 Database L1 DB v1.1.0MS_SQLDB

ACCESS CONTROL

4.2 Ensure 'CHECK_EXPIRATION' Option is set to 'ON' for All SQL Authenticated Logins Within the Sysadmin RoleCIS SQL Server 2019 Database L1 AWS RDS v1.3.0MS_SQLDB

ACCESS CONTROL

5.1.5 Ensure that default service accounts are not actively used.CIS Kubernetes Benchmark v1.9.0 L1 MasterUnix

ACCESS CONTROL

5.1.5 Ensure that default service accounts are not actively used.CIS Kubernetes v1.24 Benchmark v1.0.0 L1 MasterUnix

ACCESS CONTROL

5.1.5 Ensure that default service accounts are not actively used.CIS Kubernetes v1.23 Benchmark v1.0.1 L1 MasterUnix

ACCESS CONTROL

5.2.7 Ensure Password Age Is ConfiguredCIS Apple macOS 13.0 Ventura v2.0.0 L1Unix

ACCESS CONTROL

5.2.7 Ensure Password Age Is ConfiguredCIS Apple macOS 12.0 Monterey v3.0.0 L1Unix

ACCESS CONTROL

5.2.7 Ensure Password Age Is ConfiguredCIS Apple macOS 14.0 Sonoma v1.0.0 L1Unix

ACCESS CONTROL

5.2.7 Ensure Password Age Is ConfiguredCIS Apple macOS 10.15 Catalina v3.0.0 L1Unix

ACCESS CONTROL

5.4.1.4 Ensure inactive password lock is 30 days or less - useraddCIS Fedora 19 Family Linux Server L1 v1.0.0Unix

ACCESS CONTROL

6.5 Remove Autologin Capabilities from the GNOME desktopCIS Oracle Solaris 11.4 L1 v1.1.0Unix

ACCESS CONTROL

6.9 Disable root login for SSHCIS Oracle Solaris 11.4 L1 v1.1.0Unix

ACCESS CONTROL

7.4 Set 'default_password_lifetime' to Require a Yearly Password ChangeCIS MySQL 8.0 Community Database L1 v1.0.0MySQLDB

ACCESS CONTROL

7.5 Set 'default_password_lifetime' to Require a Yearly Password ChangeCIS MySQL 5.7 Community Database L1 v2.0.0MySQLDB

ACCESS CONTROL

7.5 Set 'default_password_lifetime' to Require a Yearly Password ChangeCIS MySQL 5.7 Enterprise Database L1 v2.0.0MySQLDB

ACCESS CONTROL

9.4 Verify System Account Default PasswordsCIS Oracle Solaris 11.4 L1 v1.1.0Unix

ACCESS CONTROL

18.2.2 Ensure 'Do not allow password expiration time longer than required by policy' is set to 'Enabled' (MS only)CIS Microsoft Windows Server 2016 STIG MS L1 v1.1.0Windows

ACCESS CONTROL

18.2.6 Ensure 'Password Settings: Password Age (Days)' is set to 'Enabled: 60 or fewer'CIS Microsoft Windows Server 2019 STIG DC STIG v1.0.1Windows

ACCESS CONTROL

18.2.7 Ensure 'Password Settings: Password Age (Days)' is set to 'Enabled: 30 or fewer' (MS only)CIS Microsoft Windows Server 2019 STIG MS L1 v1.0.1Windows

ACCESS CONTROL

18.3.2 Ensure 'Do not allow password expiration time longer than required by policy' is set to 'Enabled' (MS only)CIS Windows Server 2012 R2 MS L1 v3.0.0Windows

ACCESS CONTROL

18.3.2 Ensure 'Do not allow password expiration time longer than required by policy' is set to 'Enabled' (MS only)CIS Windows Server 2012 MS L1 v3.0.0Windows

ACCESS CONTROL

18.9.44.1 Ensure 'Block all consumer Microsoft account user authentication' is set to 'Enabled'CIS Microsoft Windows Server 2016 STIG MS L1 v1.1.0Windows

ACCESS CONTROL

18.10.42.1 Ensure 'Block all consumer Microsoft account user authentication' is set to 'Enabled' - EnabledCIS Microsoft Windows Server 2019 MS Standalone L1 v1.0.0Windows

ACCESS CONTROL

20.26 Ensure 'Emergency accounts must be automatically removed or disabled after the crisis is resolved or within 72 hours'CIS Microsoft Windows Server 2016 STIG DC STIG v1.1.0Windows

ACCESS CONTROL

20.26 Ensure 'Emergency accounts must be automatically removed or disabled after the crisis is resolved or within 72 hours'CIS Microsoft Windows Server 2016 STIG MS STIG v1.1.0Windows

ACCESS CONTROL

20.31 Ensure 'krbtgt account password' is no more than '180 days old' (STIG DC only)CIS Microsoft Windows Server 2019 STIG DC STIG v1.0.1Windows

ACCESS CONTROL

20.32 Ensure 'krbtgt account password' is no more than '180 days old' (STIG DC only)CIS Microsoft Windows Server 2016 STIG DC STIG v1.1.0Windows

ACCESS CONTROL

20.34 Ensure 'Manually managed application account passwords be changed at least annually or when a system administrator with knowledge of the password leaves the organization'CIS Microsoft Windows Server 2019 STIG DC STIG v1.0.1Windows

ACCESS CONTROL

20.35 Ensure 'Manually managed application account passwords are changed at least annually or when a system administrator with knowledge of the password leaves the organization'CIS Microsoft Windows Server 2016 STIG DC STIG v1.1.0Windows

ACCESS CONTROL

20.35 Ensure 'Manually managed application account passwords are changed at least annually or when a system administrator with knowledge of the password leaves the organization'CIS Microsoft Windows Server 2016 STIG MS STIG v1.1.0Windows

ACCESS CONTROL

20.43 Ensure 'Orphaned security identifiers (SIDs) must be removed from user rights'CIS Microsoft Windows Server 2019 STIG MS STIG v1.0.1Windows

ACCESS CONTROL

20.43 Ensure 'Orphaned security identifiers (SIDs) must be removed from user rights'CIS Microsoft Windows Server 2019 STIG DC STIG v1.0.1Windows

ACCESS CONTROL

20.44 Ensure 'Outdated or unused accounts are removed or disabled'CIS Microsoft Windows Server 2019 STIG DC STIG v1.0.1Windows

ACCESS CONTROL

20.45 Ensure 'Passwords are configured to expire'CIS Microsoft Windows Server 2019 STIG DC STIG v1.0.1Windows

ACCESS CONTROL

20.61 Ensure 'Temporary user accounts must be automatically removed or disabled after 72 hours'CIS Microsoft Windows Server 2019 STIG MS STIG v1.0.1Windows

ACCESS CONTROL

20.61 Ensure 'Temporary user accounts must be automatically removed or disabled after 72 hours'CIS Microsoft Windows Server 2019 STIG DC STIG v1.0.1Windows

ACCESS CONTROL

20.65 Ensure 'Temporary user accounts must be automatically removed or disabled after 72 hours'CIS Microsoft Windows Server 2016 STIG DC STIG v1.1.0Windows

ACCESS CONTROL