CCI-000196
The information system, for password-based authentication, stores only cryptographically-protected passwords.
Ensure system-auth and password-auth files are symbolic links pointing to system-auth-local and password-auth-local
4 rules found Severity: Medium

1 rule found Severity: Medium

CA VM:Secure product Password Encryption (PEF) option must be properly configured to store and transmit cryptographically-protected passwords.
1 rule found Severity: High

The Apache Tomcat Manager Web app password must be cryptographically hashed with a DoD approved algorithm.
1 rule found Severity: Medium

The Ubuntu operating system must encrypt all stored passwords with a FIPS 140-2 approved cryptographic hashing algorithm.
1 rule found Severity: Medium

If passwords are used for authentication, MongoDB must store only hashed, salted representations of passwords.
3 rules found Severity: High

1 rule found Severity: Medium

If passwords are used for authentication, PostgreSQL must store only hashed, salted representations of passwords.
3 rules found Severity: High

The Red Hat Enterprise Linux operating system must be configured so that the PAM system service is configured to store only encrypted representations of passwords.
1 rule found Severity: Medium

The Red Hat Enterprise Linux operating system must be configured to use the shadow file to store only encrypted representations of passwords.
1 rule found Severity: Medium

The Red Hat Enterprise Linux operating system must be configured so that user and group account administration utilities are configured to store only encrypted representations of passwords.
1 rule found Severity: Medium

The Red Hat Enterprise Linux operating system must be configured to prevent overwriting of custom authentication configuration settings by the authconfig utility.
1 rule found Severity: Medium

If passwords are used for authentication, the EDB Postgres Advanced Server must store only hashed, salted representations of passwords.
2 rules found Severity: High

1 rule found Severity: Medium

1 rule found Severity: Low

For accounts using password or PINs for authentication, the Enterprise Voice, Video, and Messaging Endpoint must store only cryptographic representations of passwords.
1 rule found Severity: Medium

When using locally stored user accounts, the Enterprise Voice, Video, and Messaging Session Manager must store only cryptographic representations of passwords.
1 rule found Severity: Medium

If AIX is using LDAP for authentication or account information, the /etc/ldap.conf file (or equivalent) must not contain passwords.
1 rule found Severity: High

1 rule found Severity: High

A unique database name and a unique MySQL user with a secure password must be created for use in Jamf Pro EMM.
1 rule found Severity: Medium

1 rule found Severity: High

The JBoss Password Vault must be used for storing passwords or other sensitive configuration information.
1 rule found Severity: Medium

1 rule found Severity: Medium

4 rules found Severity: High

1 rule found Severity: High

The Oracle Linux operating system must be configured so that the PAM system service is configured to store only encrypted representations of passwords.
1 rule found Severity: Medium

The Oracle Linux operating system must be configured to use the shadow file to store only encrypted representations of passwords.
1 rule found Severity: Medium

The Oracle Linux operating system must be configured so that user and group account administration utilities are configured to store only encrypted representations of passwords.
1 rule found Severity: Medium

The Oracle Linux operating system must be configured to prevent overwriting of custom authentication configuration settings by the authconfig utility.
1 rule found Severity: Medium

If passwords are used for authentication, the MySQL Database Server 8.0 must store only hashed, salted representations of passwords.
1 rule found Severity: Medium

The Riverbed NetProfiler must be configured to implement cryptographic mechanisms using a FIPS 140-2/140-3 validated algorithm to protect the confidentiality and integrity of all cryptographic functions.
1 rule found Severity: High

If passwords are used for authentication, Redis Enterprise DBMS must store only hashed, salted representations of passwords.
1 rule found Severity: Medium

SLEM 5 must configure the Linux Pluggable Authentication Modules (PAM) to only store encrypted representations of passwords.
1 rule found Severity: Medium

SLEM 5 must employ FIPS 140-2/140-3-approved cryptographic hashing algorithms for system authentication.
1 rule found Severity: High

1 rule found Severity: High

1 rule found Severity: High

1 rule found Severity: Medium

1 rule found Severity: High

1 rule found Severity: High

If passwords are used for authentication, MariaDB must store only hashed, salted representations of passwords.
1 rule found Severity: High

1 rule found Severity: High

1 rule found Severity: High

1 rule found Severity: High

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

RHEL 8 must encrypt all stored passwords with a FIPS 140-2 approved cryptographic hashing algorithm.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

RHEL 9 must be configured so that user and group account administration utilities are configured to store only encrypted representations of passwords.
1 rule found Severity: Medium

RHEL 9 must be configured to use the shadow file to store only encrypted representations of passwords.
1 rule found Severity: Medium

The SUSE operating system must employ FIPS 140-2-approved cryptographic hashing algorithms for all stored passwords.
2 rules found Severity: Medium

The SUSE operating system must configure the Linux Pluggable Authentication Modules (PAM) to only store encrypted representations of passwords.
2 rules found Severity: Medium

The SUSE operating system must employ FIPS 140-3 approved cryptographic hashing algorithms for all stored passwords.
2 rules found Severity: Medium

1 rule found Severity: Medium

RHEL 9 pam_unix.so module must be configured in the password-auth file to use a FIPS 140-3 approved cryptographic hashing algorithm for system authentication.
1 rule found Severity: Medium

Systems must employ cryptographic hashes for passwords using the SHA-2 family of algorithms or FIPS 140-2 approved successors.
2 rules found Severity: Medium

2 rules found Severity: Medium

1 rule found Severity: High

1 rule found Severity: High

Rancher MCM must use a centralized user management solution to support account management functions. For accounts using password authentication, the container platform must use FIPS-validated SHA-2 or later protocol to protect the integrity of the password authentication process.
1 rule found Severity: High
