Enforce pam_faillock for Local Accounts Only
Ensure PAM Enforces Password Requirements - Enforce for Local Accounts Only
AAA Services must be configured to provide automated account management functions.
Compliance Guardian must provide automated mechanisms for supporting account management functions.
The application must provide automated mechanisms for supporting account management functions.
DocAve must provide automated mechanisms for supporting account management functions.
The BlackBerry UEM server must be configured to leverage the MDM platform user accounts and groups for BlackBerry UEM server user identification and CAC authentication.
Authentication of MDM platform accounts must be configured so they are implemented via an enterprise directory service.
IDMS must support the implementation of an external security manager (ESM) to handle account management and user accesses, etc.
The DBN-6300 must provide automated support for account management functions.
LDAP integration in Docker Enterprise must be configured.
The storage system must only be operated in conjunction with an LDAP server in a trusted environment if an Active Directory server is not available.
The storage system must only be operated in conjunction with an Active Directory server in a trusted environment if an LDAP server is not available.
DB2 must integrate with an organization-level authentication/access mechanism providing account management and automation for all users, groups, roles, and any other principals.
The MaaS360 MDM server must be configured to leverage the MDM platform user accounts and groups for MaaS360 MDM server user identification and authentication.
Authentication of MaaS360 MDM platform accounts must be configured so they are implemented via an enterprise directory service.
Access to the MQ Appliance network element must use two or more authentication servers for the purpose of granting administrative access.
The IBM z/VM TCP/IP DTCPARMS files must be properly configured to connect to an external security manager.
The Jamf Pro EMM server must be configured to leverage the MDM platform user accounts and groups for Jamf Pro EMM server user identification and CAC authentication.
Authentication of Jamf Pro EMM server accounts must be configured so they are implemented either via an Authentication Gateway Service (AGS) which connects to the site DoD Identity Access Management (IdAM) environment that utilizes CAC authentication or via strong password controls for the administrator local accounts.
The Mainframe Product must use an external security manager for all account management functions.
Azure SQL Database must enforce approved authorizations for logical access to database information and system resources in accordance with applicable access control policies.
SQL Server authentication and identity management must be integrated with an organization-level authentication/access mechanism providing account management and automation for all users, groups, roles, and any other principals.
Access to Prisma Cloud Compute must be managed based on user need and least privileged using external identity providers for authentication and grouping to role-based assignments when possible.
Riverbed Optimization System (RiOS) must provide automated support for account management functions.
Innoslate must provide automated mechanisms for supporting account management functions.
The Samsung SDS EMM server must be configured to use one-time password in addition to username and password for administrator logon to the server.
The Samsung SDS EMM must be configured to leverage the MDM platform administrator accounts and groups for Samsung SDS EMM user identification and CAC authentication.
Authentication of MDM platform accounts must be configured so they are implemented via an enterprise directory service.
The Tanium Server must be configured with a connector to sync to Microsoft Active Directory for account management functions, must isolate security functions from non-security functions, and must terminate shared/group account credentials when members leave the group.
The Tanium Server must be configured to only use Microsoft Active Directory for account management functions.
The Tanium Application Server must be configured to only use LDAP for account management functions.
The Tanium Application Server must be configured to only use Microsoft Active Directory for account management functions.
The UEM server must provide automated mechanisms for supporting account management functions.
The Workspace ONE UEM server must be configured to leverage the MDM platform user and administrator accounts and groups for Workspace ONE UEM server user identification and authentication.
PostgreSQL must integrate with an organization-level authentication/access mechanism providing account management and automation for all users, groups, roles, and any other principals.
The DBMS must integrate with an organization-level authentication/access mechanism providing account management and automation for all users, groups, roles, and any other principals.
The container platform must use a centralized user management solution to support account management functions.
The EDB Postgres Advanced Server must integrate with an organization-level authentication/access mechanism providing account management and automation for all users, groups, roles, and any other principals.
CA-ACF2 OPTS GSO record must be set to ABORT mode.
The operating system must provide automated mechanisms for supporting account management functions.
The HPE 3PAR OS must be configured for centralized account management functions via LDAP.
The HPE 3PAR OS must provide automated mechanisms for supporting account management functions via AD.
The shipped /etc/security/mkuser.sys file on AIX must not be customized directly.
The regular users default primary group must be staff (or equivalent) on AIX.
CA-TSS MODE Control Option must be set to FAIL.
IBM RACF must be installed and active on the system.
The Kubernetes Controller Manager must create unique service accounts for each work payload.
MarkLogic Server must integrate with an organization-level authentication/access mechanism providing account management and automation for all users, groups, roles, and any other principals.
MariaDB must integrate with an organization-level authentication/access mechanism providing account management and automation for all users, groups, roles, and any other principals.
MongoDB must integrate with an organization-level authentication/access mechanism providing account management and automation for all users, groups, roles, and any other principals.
SQL Server databases must integrate with an organization-level authentication/access mechanism providing account management and automation for all users, groups, roles, and any other principals.
SQL Server must integrate with an organization-level authentication/access mechanism providing account management and automation for all users, groups, roles, and any other principals.
SQL Server must be configured to utilize the most-secure authentication method available.
The system must employ automated mechanisms for supporting Oracle user account management.
The system must employ automated mechanisms for supporting Oracle user account management.
MySQL Database Server 8.0 must integrate with an organization-level authentication/access mechanism providing account management and automation for all users, groups, roles, and any other principals.
Redis Enterprise DBMS must integrate with an organization-level authentication/access mechanism providing account management and automation for all users, groups, roles, and any other principals.
RKE2 must use a centralized user management solution to support account management functions.
OpenShift must use a centralized user management solution to support account management functions.
The kubeadmin account must be disabled.
The VMM must provide automated mechanisms for supporting account management functions.
The BIG-IP appliance must provide automated support for account management functions.
AAA Services must be configured to notify the system administrators (SAs) and information system security officer (ISSO) when accounts are created.
AAA Services must be configured to notify the system administrators (SAs) and information system security officer (ISSO) when accounts are modified.
AAA Services must be configured to notify the system administrators (SAs) and information system security officer (ISSO) for account disabling actions.
AAA Services must be configured to notify the system administrators (SAs) and information system security officer (ISSO) for account removal actions.
AAA Services must be configured to notify system administrators (SAs) and information system security officer (ISSO) of account enabling actions.
The application must notify system administrators (SAs) and information system security officers (ISSOs) when accounts are created.
The application must notify system administrators (SAs) and information system security officers (ISSOs) when accounts are modified.
The application must notify system administrators (SAs) and information system security officers (ISSOs) of account disabling actions.
The application must notify system administrators (SAs) and information system security officers (ISSOs) of account removal actions.
The application must notify system administrators (SAs) and information system security officers (ISSOs) of account enabling actions.
For devices and hosts within its scope of coverage, the Central Log Server must be configured to notify the system administrator (SA) and information system security officer (ISSO) when account modification events are received.
For devices and hosts within its scope of coverage, the Central Log Server must notify the system administrator (SA) and information system security officer (ISSO) when events indicating account disabling actions are received.
For devices and hosts within its scope of coverage, the Central Log Server must notify the System Administrator (SA) and Information System Security Officer (ISSO) when events indicating account removal actions are received.
The Central Log Server must notify system administrators and ISSO when accounts are created.
The container platform must notify system administrators (SAs) and the information system security officer (ISSO) when accounts are created.
The container platform must notify system administrators (SAs) and the information system security officer (ISSO) when accounts are modified.
The container platform must notify system administrators and ISSO for account disabling actions.
The container platform must notify system administrators and ISSO for account removal actions.
The container platform must notify the system administrator (SA) and information system security officer (ISSO) of account enabling actions.
Dragos Platform must use an Identity Provider (IDP) for authentication and authorization processes.
The operating system must notify system administrators and ISSOs when accounts are created.
The operating system must notify system administrators and ISSOs when accounts are modified.
The operating system must notify system administrators and ISSOs when accounts are disabled.
The operating system must notify system administrators and ISSOs when accounts are removed.
The operating system must notify system administrators (SAs) and information system security officers (ISSOs) of account enabling actions.
AIX must provide audit record generation functionality for DoD-defined auditable events.
The IBM Security zSecure Suite products must use an external security manager (RACF, ACF2, or TSS) for all account management functions.
The IBM z/OS system administrator (SA) must develop a process notify appropriate personnel when accounts are removed.
The IBM z/OS system administrator (SA) must develop a process notify appropriate personnel when accounts are modified.
The IBM z/OS system administrator (SA) must develop a process notify appropriate personnel when accounts are deleted.
The IBM z/OS system administrator (SA) must develop a process notify appropriate personnel when accounts are created.
IBM z/OS system administrator must develop a procedure to notify system administrators (SAs) and information system security officers (ISSOs) of account enabling actions.
The IBM z/OS system administrator (SA) must develop a process to notify appropriate personnel when accounts are created.
The IBM z/OS system administrator (SA) must develop a process to notify appropriate personnel when accounts are modified.
The IBM z/OS system administrator (SA) must develop a process to notify appropriate personnel when accounts are deleted.
The IBM z/OS system administrator (SA) must develop a process to notify appropriate personnel when accounts are removed.
The IBM z/OS system administrator (SA) must develop a process to notify information system security officers (ISSOs) of account enabling actions.
IBM z/OS system administrator (SA) must develop a procedure to notify SAs and information system security officers (ISSOs) of account enabling actions.
The Juniper SRX Services Gateway must allow only the information system security manager (ISSM) (or administrators/roles appointed by the ISSM) to select which auditable events are to be generated and forwarded to the syslog and/or local logs.
For local logging, the Juniper SRX Services Gateway must generate a message to the system management console when a log processing failure occurs.
In the event that communications with the events server is lost, the Juniper SRX Services Gateway must continue to queue log records locally.
The Juniper SRX Services Gateway must be configured to use a centralized authentication server to authenticate privileged users for remote and nonlocal access for device management.
The Mainframe Product must notify system programmers and security administrators when accounts are created.
The Mainframe Product must notify system programmers and security administrators when accounts are modified.
The Mainframe Product must notify system programmers and security administrators for account disabling actions.
The Mainframe Product must notify system programmers and security administrators for account removal actions.
The Mainframe Product must notify system programmers and security administrators of account enabling actions.
MKE must be configured to integrate with an Enterprise Identity Provider.
Azure SQL Databases must integrate with Azure Active Directory for providing account management and automation for all users, groups, roles, and any other principals.
Microsoft Intune service must notify system administrator and information system security officer (ISSO) of account enabling actions.
Access to Prisma Cloud Compute must be managed based on user need and least privileged using external identity providers for authentication and grouping to role-based assignments when possible.
OL 8 must generate audit records for all account creation events that affect "/etc/shadow".
OL 8 must generate audit records for all account creation events that affect "/etc/security/opasswd".
OL 8 must generate audit records for all account creation events that affect "/etc/passwd".
OL 8 must generate audit records for all account creation events that affect "/etc/gshadow".
OL 8 must generate audit records for all account creation events that affect "/etc/group".
OL 8 must generate audit records for all account creations, modifications, disabling, and termination events that affect "/etc/sudoers".
OL 8 must generate audit records for all account creations, modifications, disabling, and termination events that affect "/etc/sudoers.d/".
OpenShift must generate audit rules to capture account related actions.
RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/sudoers.
RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/sudoers.d/ directory.
RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/group.
RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/gshadow.
RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/opasswd.
RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/passwd.
RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/shadow.
The SUSE operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/passwd.
The SUSE operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/group.
The SUSE operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/shadow.
The SUSE operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/opasswd.
The SUSE operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/security/opasswd.
Splunk Enterprise must notify the system administrator (SA) and information system security officer (ISSO) when account events are received (creation, deletion, modification, disabling).
Splunk Enterprise must notify analysts of applicable events for Tier 2 CSSP and JRSS only.
Splunk Enterprise must notify the system administrator (SA) and information system security officer (ISSO) when account events are received (creation, deletion, modification, or disabling).
The Tanium Operating System (TanOS) must notify system administrators (SAs) and information system security officers (ISSOs) when accounts are created.
The Tanium Operating System (TanOS) must audit and notify system administrators (SAs) and information system security officers (ISSOs) when accounts are modified.
The Tanium Operating System (TanOS) must notify system administrators (SAs) and information system security officers (ISSOs) when accounts are removed.
Tanium must audit and notify system administrators (SAs) and information system security officers (ISSOs) when accounts are enabled.
Tanium must notify system administrator (SA) and the information system security officer (ISSO) when accounts are created.
Tanium must notify system administrators (SAs) and the information system security officer (ISSO) when accounts are modified.
Tanium must notify system administrators (SAs) and the information system security officer (ISSO) for account disabling actions.
Tanium must notify system administrators (SAs) and the information system security officer (ISSO) for account removal actions.
Tanium must notify the system administrator (SA) and information system security officer (ISSO) of account enabling actions.
Tanium must notify system administrator and information system security officer (ISSO) when accounts are created.
Tanium must notify system administrators and the information system security officer (ISSO) when accounts are modified.
Tanium must notify the system administrator and information system security officer (ISSO) of account enabling actions.
Tanium must notify system administrators and the information system security officer (ISSO) for account disabling actions.
Tanium must notify system administrators and the information system security officer (ISSO) for account removal actions.
The VMM must notify system administrators (SAs) and information system security officers (ISSOs) when accounts are created.
The VMM must notify the system administrator (SA) and information system security officer (ISSO) when accounts are modified.
The VMM must notify the system administrator (SA) and information system security officer (ISSO) when accounts are disabled.
The VMM must notify the system administrator (SA) and information system security officer (ISSO) when accounts are removed.
The VMM must notify the system administrator (SA) and information system security officer (ISSO) of account enabling actions.
The ESXi host must offload logs via syslog.
The vCenter Server must provide an immediate real-time alert to the system administrator (SA) and information system security officer (ISSO), at a minimum, on every Single Sign-On (SSO) account action.
The UEM server must notify system administrators (SAs) and the information system security officer (ISSO) when accounts are created.
The UEM server must notify system administrators (SAs) and the information system security officer (ISSO) when accounts are modified.
The UEM server must notify system administrators (SAs) and the information system security officer (ISSO) for account disabling actions.
The UEM server must notify system administrators (SAs) and the information system security officer (ISSO) for account removal actions.
The UEM server must notify system administrator (SA) and information system security officer (ISSO) of account enabling actions.