Big Sur - Require users to reauthenticate for privilege escalation | NIST macOS Big Sur v1.4.0 - All Profiles | Unix | IDENTIFICATION AND AUTHENTICATION |
Big Sur - Require users to reauthenticate when changing authenticators | NIST macOS Big Sur v1.4.0 - 800-53r5 Moderate | Unix | IDENTIFICATION AND AUTHENTICATION |
Big Sur - Require users to reauthenticate when changing authenticators | NIST macOS Big Sur v1.4.0 - 800-53r5 Low | Unix | IDENTIFICATION AND AUTHENTICATION |
Big Sur - Require users to reauthenticate when changing authenticators | NIST macOS Big Sur v1.4.0 - 800-53r5 High | Unix | IDENTIFICATION AND AUTHENTICATION |
Big Sur - Require users to reauthenticate when changing authenticators | NIST macOS Big Sur v1.4.0 - All Profiles | Unix | IDENTIFICATION AND AUTHENTICATION |
Catalina - Require users to reauthenticate for privilege escalation | NIST macOS Catalina v1.5.0 - All Profiles | Unix | IDENTIFICATION AND AUTHENTICATION |
Catalina - Require users to reauthenticate when changing authenticators | NIST macOS Catalina v1.5.0 - All Profiles | Unix | IDENTIFICATION AND AUTHENTICATION |
MD3X-00-000700 - MongoDB must require users to reauthenticate when organization-defined circumstances or situations require reauthentication. | DISA STIG MongoDB Enterprise Advanced 3.x v1r1 | Unix | |
Monterey - Require users to reauthenticate for privilege escalation | NIST macOS Monterey v1.0.0 - All Profiles | Unix | IDENTIFICATION AND AUTHENTICATION |
Monterey - Require users to reauthenticate when changing authenticators | NIST macOS Monterey v1.0.0 - 800-53r5 Moderate | Unix | IDENTIFICATION AND AUTHENTICATION |
Monterey - Require users to reauthenticate when changing authenticators | NIST macOS Monterey v1.0.0 - 800-53r5 Low | Unix | IDENTIFICATION AND AUTHENTICATION |
Monterey - Require users to reauthenticate when changing authenticators | NIST macOS Monterey v1.0.0 - All Profiles | Unix | IDENTIFICATION AND AUTHENTICATION |
Monterey - Require users to reauthenticate when changing authenticators | NIST macOS Monterey v1.0.0 - 800-53r5 High | Unix | IDENTIFICATION AND AUTHENTICATION |
MYS8-00-010400 - The MySQL Database Server 8.0 must require users to reauthenticate when organization-defined circumstances or situations require reauthentication. | DISA Oracle MySQL 8.0 v1r3 DB | MySQLDB | |
OL07-00-010343 - The Oracle Linux operating system must require re-authentication when using the 'sudo' command - sudo command. | DISA Oracle Linux 7 STIG v2r11 | Unix | |
OL07-00-010343 - The Oracle Linux operating system must require re-authentication when using the 'sudo' command - sudo command. | DISA Oracle Linux 7 STIG v2r12 | Unix | |
OL07-00-010343 - The Oracle Linux operating system must require re-authentication when using the 'sudo' command - sudo command. | DISA Oracle Linux 7 STIG v2r13 | Unix | |
OL07-00-010343 - The Oracle Linux operating system must require re-authentication when using the 'sudo' command - sudo command. | DISA Oracle Linux 7 STIG v2r5 | Unix | |
OL07-00-010350 - The Oracle Linux operating system must be configured so users must re-authenticate for privilege escalation - sudoers | DISA Oracle Linux 7 STIG v2r9 | Unix | |
OL07-00-010350 - The Oracle Linux operating system must be configured so users must re-authenticate for privilege escalation - sudoers.d | DISA Oracle Linux 7 STIG v2r7 | Unix | |
OL08-00-010380 - OL 8 must require users to provide a password for privilege escalation. | DISA Oracle Linux 8 STIG v1r9 | Unix | |
OL08-00-010381 - OL 8 must require users to reauthenticate for privilege escalation and changing roles. | DISA Oracle Linux 8 STIG v1r9 | Unix | |
PHTN-30-000062 - The Photon operating system must require users to reauthenticate for privilege escalation. | DISA STIG VMware vSphere 7.0 Photon OS v1r2 | Unix | |
RHEL-07-010343 - The Red Hat Enterprise Linux operating system must require re-authentication when using the 'sudo' command - sudo command. | DISA Red Hat Enterprise Linux 7 STIG v3r12 | Unix | |
RHEL-07-010343 - The Red Hat Enterprise Linux operating system must require re-authentication when using the 'sudo' command - sudo command. | DISA Red Hat Enterprise Linux 7 STIG v3r7 | Unix | |
RHEL-07-010344 - The Red Hat Enterprise Linux operating system must not be configured to bypass password requirements for privilege escalation. | DISA Red Hat Enterprise Linux 7 STIG v3r14 | Unix | |
RHEL-08-010380 - RHEL 8 must require users to provide a password for privilege escalation. | DISA Red Hat Enterprise Linux 8 STIG v1r3 | Unix | |
RHEL-08-010380 - RHEL 8 must require users to provide a password for privilege escalation. | DISA Red Hat Enterprise Linux 8 STIG v1r6 | Unix | |
RHEL-08-010381 - RHEL 8 must require users to reauthenticate for privilege escalation. | DISA Red Hat Enterprise Linux 8 STIG v1r6 | Unix | |
RHEL-08-010384 - RHEL 8 must require re-authentication when using the 'sudo' command - sudo command. | DISA Red Hat Enterprise Linux 8 STIG v1r8 | Unix | |
RHEL-08-010385 - The RHEL 8 operating system must not be configured to bypass password requirements for privilege escalation. | DISA Red Hat Enterprise Linux 8 STIG v1r13 | Unix | |
RHEL-08-010385 - The RHEL 8 operating system must not be configured to bypass password requirements for privilege escalation. | DISA Red Hat Enterprise Linux 8 STIG v1r7 | Unix | |
RHEL-08-010385 - The RHEL 8 operating system must not be configured to bypass password requirements for privilege escalation. | DISA Red Hat Enterprise Linux 8 STIG v1r9 | Unix | |
SLES-12-010113 - The SUSE operating system must require re-authentication when using the 'sudo' command. | DISA SLES 12 STIG v2r11 | Unix | |
SLES-12-010113 - The SUSE operating system must require re-authentication when using the 'sudo' command. | DISA SLES 12 STIG v2r6 | Unix | |
SLES-12-010114 - The SUSE operating system must not be configured to bypass password requirements for privilege escalation. | DISA SLES 12 STIG v2r6 | Unix | |
SLES-12-010114 - The SUSE operating system must not be configured to bypass password requirements for privilege escalation. | DISA SLES 12 STIG v2r9 | Unix | |
SLES-15-010450 - The SUSE operating system must reauthenticate users when changing authenticators, roles, or escalating privileges - NOPASSWD | DISA SLES 15 STIG v1r9 | Unix | |
WN11-CC-000150 - The user must be prompted for a password on resume from sleep (plugged in). | DISA Windows 11 STIG v1r4 | Windows | |
WN11-CC-000270 - Passwords must not be saved in the Remote Desktop Client. | DISA Windows 11 STIG v1r5 | Windows | |
WN11-CC-000280 - Remote Desktop Services must always prompt a client for passwords upon connection. | DISA Windows 11 STIG v1r2 | Windows | |
WN11-CC-000355 - The Windows Remote Management (WinRM) service must not store RunAs credentials. | DISA Windows 11 STIG v1r2 | Windows | |
WN11-SO-000245 - User Account Control approval mode for the built-in Administrator must be enabled. | DISA Windows 11 STIG v1r4 | Windows | |
WN11-SO-000255 - User Account Control must automatically deny elevation requests for standard users. | DISA Windows 11 STIG v1r2 | Windows | |
WN11-SO-000270 - User Account Control must run all administrators in Admin Approval Mode, enabling UAC. | DISA Windows 11 STIG v1r2 | Windows | |
WN11-SO-000270 - User Account Control must run all administrators in Admin Approval Mode, enabling UAC. | DISA Windows 11 STIG v1r4 | Windows | |
WN22-CC-000340 - Windows Server 2022 must not save passwords in the Remote Desktop Client. | DISA Windows Server 2022 STIG v1r4 | Windows | |
WN22-CC-000360 - Windows Server 2022 Remote Desktop Services must always prompt a client for passwords upon connection. | DISA Windows Server 2022 STIG v1r4 | Windows | |
WN22-CC-000360 - Windows Server 2022 Remote Desktop Services must always prompt a client for passwords upon connection. | DISA Windows Server 2022 STIG v1r5 | Windows | |
WN22-SO-000440 - Windows Server 2022 User Account Control (UAC) must run all administrators in Admin Approval Mode, enabling UAC. | DISA Windows Server 2022 STIG v1r5 | Windows | |