Ensure PAM Enforces Password Requirements - Minimum Different Categories
Ensure PAM Enforces Password Requirements - Minimum Different Characters
Ensure PAM Enforces Password Requirements - Maximum Consecutive Repeating Characters from Same Character Class
Set Password Maximum Consecutive Repeating Characters
Ensure PAM Enforces Password Requirements - Enforce for root User
Set Password Strength Minimum Different Characters
AAA Services must be configured to require the change of at least eight of the total number of characters when passwords are changed.
Compliance Guardian must provide automated mechanisms for supporting account management functions.
The application must require the change of at least 8 of the total number of characters when passwords are changed.
If multifactor authentication is not supported and passwords must be used, the CA API Gateway must require that when a password is changed, the characters are changed in at least 8 of the positions within the password.
The Central Log Server must be configured to require the change of at least 8 of the total number of characters when passwords are changed.
The FortiGate device must require that when a password is changed, the characters are changed in at least eight of the positions within the password.
Forescout must require that when a password is changed, the characters are changed in at least eight of the positions within the password.
The HYCU server must require that when a password is changed, the characters are changed in at least eight of the positions within the password.
IBM zVM CA VM:Secure product PASSWORD user exit must be in use.
The Mainframe Product must require the change of at least 8 of the total number of characters when passwords are changed.
If SQL Server authentication, using passwords, is employed, SQL Server must enforce the DoD standards for password complexity.
The network device must require that when a password is changed, the characters are changed in at least eight of the positions within the password.
Nutanix AOS must require the change of at least 50 percent of the total number of characters when passwords are changed.
Nutanix AOS must require the change of at least four character classes when passwords are changed.
Nutanix AOS must require the maximum number of repeating characters be limited to three when passwords are changed.
Nutanix AOS must require the maximum number of repeating characters of the same character class be limited to four when passwords are changed.
Access to Prisma Cloud Compute must be managed based on user need and least privileged using external identity providers for authentication and grouping to role-based assignments when possible.
The Riverbed NetProfiler must be configured to enforce a minimum 15-character password length.
Riverbed Optimization System (RiOS) must require that when a password is changed, the characters are changed in at least 15 of the positions within the password.
Innoslate must use multifactor authentication for network access to privileged and non-privileged accounts.
The UEM server must require the change of at least 15 of the total number of characters when passwords are changed.
The password values must be set to meet the requirements in accordance with DoDI 8500.2 for DoD information systems processing sensitive information and above, and CJCSI 6510.01E (INFORMATION ASSURANCE (IA) AND COMPUTER NETWORK DEFENSE (CND)).
Apple iOS/iPadOS 17 must be configured to not allow passwords that include more than four repeating or sequential characters.
The Ubuntu operating system must require the change of at least 8 characters when passwords are changed.
The Cisco ASA must be configured to require that when a password is changed, the characters are changed in at least eight of the positions within the password.
The Cisco router must be configured to require that when a password is changed, the characters are changed in at least eight of the positions within the password.
The Cisco switch must be configured to require that when a password is changed, the characters are changed in at least eight of the positions within the password.
The container platform must require the change of at least 15 of the total number of characters when passwords are changed.
The HPE Nimble must require that when a password is changed, the characters are changed in at least eight of the positions within the password.
Google Android 14 must be configured to not allow passwords that include more than four repeating or sequential characters.
The operating system must require the change of at least 50% of the total number of characters when passwords are changed.
AIX must require the change of at least 50% of the total number of characters when passwords are changed.
The CA-TSS NEWPW control options must be properly set.
ACF2 PSWD GSO record value must be set to require the change of at least 50% of the total number of characters when passwords are changed.
IBM RACF exit ICHPWX01 must be installed and properly configured.
The ICS must be configured to require that when a password is changed, the characters are changed in at least eight of the positions within the password.
The Juniper EX switch must be configured to require that when a password is changed, the characters are changed in at least eight of the positions within the password.
The DBMS must support organizational requirements to enforce the number of characters that get changed when passwords are changed.
The Oracle Linux operating system must be configured so that when passwords are changed a minimum of eight of the total number of characters must be changed.
The Oracle Linux operating system must be configured so that when passwords are changed a minimum of four character classes must be changed.
The Oracle Linux operating system must be configured so that when passwords are changed the number of repeating consecutive characters must not be more than three characters.
The Oracle Linux operating system must be configured so that when passwords are changed the number of repeating characters of the same character class must not be more than four characters.
OL 8 must require the maximum number of repeating characters of the same character class be limited to four when passwords are changed.
OL 8 must require the maximum number of repeating characters be limited to three when passwords are changed.
OL 8 must require the change of at least four character classes when passwords are changed.
OL 8 must require the change of at least 8 characters when passwords are changed.
If multifactor authentication is not available and passwords must be used, the Palo Alto Networks security platform must require that when a password is changed, the characters are changed in at least 8 of the positions within the password.
OpenShift must use FIPS validated LDAP or OpenIDConnect.
The Red Hat Enterprise Linux operating system must be configured so that when passwords are changed a minimum of eight of the total number of characters must be changed.
The Red Hat Enterprise Linux operating system must be configured so that when passwords are changed a minimum of four character classes must be changed.
The Red Hat Enterprise Linux operating system must be configured so that when passwords are changed the number of repeating consecutive characters must not be more than three characters.
The Red Hat Enterprise Linux operating system must be configured so that when passwords are changed the number of repeating characters of the same character class must not be more than four characters.
RHEL 8 must require the maximum number of repeating characters of the same character class be limited to four when passwords are changed.
RHEL 8 must require the maximum number of repeating characters be limited to three when passwords are changed.
RHEL 8 must require the change of at least four character classes when passwords are changed.
RHEL 8 must require the change of at least 8 characters when passwords are changed.
The SUSE operating system must require the change of at least eight (8) of the total number of characters when passwords are changed.
RHEL 9 must enforce password complexity rules for the root account.
RHEL 9 must require the change of at least eight characters when passwords are changed.
RHEL 9 must require the maximum number of repeating characters of the same character class be limited to four when passwords are changed.
RHEL 9 must require the maximum number of repeating characters be limited to three when passwords are changed.
RHEL 9 must require the change of at least four character classes when passwords are changed.
The SUSE operating system must require the change of at least eight of the total number of characters when passwords are changed.
The system must require at least eight characters be changed between the old and new passwords during a password change.
The VMM must require the change of at least 8 of the total number of characters when passwords are changed.
Samsung Android must be configured to not allow passwords that include more than four repeating or sequential characters.
The ESXi host must be configured with a sufficiently complex password policy.
The ESXi host must enforce password complexity by configuring a password quality policy.
The Photon operating system must require that new passwords are at least four characters different from the old password.
The Photon operating system must require the change of at least eight characters when passwords are changed.
If multifactor authentication is not supported and passwords must be used, the BIG-IP appliance must require that when a password is changed, the characters are changed in at least eight (8) of the positions within the password.
The application must require the change of at least eight of the total number of characters when passwords are changed.
Ubuntu 22.04 LTS must require the change of at least eight characters when passwords are changed.
Dragos Platform must use an Identity Provider (IDP) for authentication and authorization processes.
The F5 BIG-IP appliance must require that when a password is changed, the characters are changed in at least eight of the positions within the password.
MKE must be configured to integrate with an Enterprise Identity Provider.
Access to Prisma Cloud Compute must be managed based on user need and least privileged using external identity providers for authentication and grouping to role-based assignments when possible.
OL 8 must require the change of at least eight characters when passwords are changed.
SLEM 5 must require the change of at least eight of the total number of characters when passwords are changed.
The NSX Manager must require that when a password is changed, the characters are changed in at least eight of the positions within the password.