CCI-004062
For password-based authentication, store passwords using an approved salted key derivation function, preferably using a keyed hash.
1 rule found Severity: Low

If passwords are used for authentication, PostgreSQL must store only hashed, salted representations of passwords.
1 rule found Severity: High

2 rules found Severity: High

If passwords are used for authentication, the EDB Postgres Advanced Server must store only hashed, salted representations of passwords.
1 rule found Severity: High

The DNS server implementation must, for password-based authentication, store passwords using an approved salted key derivation function, preferably using a keyed hash.
1 rule found Severity: Medium

If AIX is using LDAP for authentication or account information, the /etc/ldap.conf file (or equivalent) must not contain passwords.
1 rule found Severity: High

1 rule found Severity: High

The Apache Tomcat Manager Web app password must be cryptographically hashed with a DOD-approved algorithm.
1 rule found Severity: Medium

A unique database name and a unique MySQL user with a secure password must be created for use in Jamf Pro EMM.
1 rule found Severity: Medium

1 rule found Severity: High

2 rules found Severity: High

The network device must be configured to store passwords using an approved salted key derivation function, preferably using a keyed hash for password-based authentication.
1 rule found Severity: High

The Oracle Linux operating system must be configured so that the PAM system service is configured to store only encrypted representations of passwords.
1 rule found Severity: Medium

The Oracle Linux operating system must be configured to use the shadow file to store only encrypted representations of passwords.
1 rule found Severity: Medium

The Oracle Linux operating system must be configured so that user and group account administration utilities are configured to store only encrypted representations of passwords.
1 rule found Severity: Medium

The Oracle Linux operating system must be configured to prevent overwriting of custom authentication configuration settings by the authconfig utility.
1 rule found Severity: Medium

If passwords are used for authentication, the MySQL Database Server 8.0 must store only hashed, salted representations of passwords.
1 rule found Severity: Medium

The Riverbed NetProfiler must be configured to implement cryptographic mechanisms using a FIPS 140-2/140-3 validated algorithm to protect the confidentiality and integrity of all cryptographic functions.
1 rule found Severity: High

If passwords are used for authentication, Redis Enterprise DBMS must store only hashed, salted representations of passwords.
1 rule found Severity: Medium

The web server must, for password-based authentication, store passwords using an approved salted key derivation function, preferably using a keyed hash.
1 rule found Severity: Medium

For password-based authentication, AAA Services must be configured to store passwords using an approved salted key derivation function, preferably using a keyed hash.
1 rule found Severity: High

The application server must for password-based authentication, store passwords using an approved salted key derivation function, preferably using a keyed hash.
1 rule found Severity: Medium

1 rule found Severity: High

1 rule found Severity: Medium

2 rules found Severity: High

For accounts using password authentication, the Central Log Server must be configured to store only cryptographic representations of passwords.
1 rule found Severity: High

1 rule found Severity: High

AlmaLinux OS 9 must be configured so that libuser is configured to store only encrypted representations of passwords.
1 rule found Severity: High

AlmaLinux OS 9 must be configured so that the system's shadow file is configured to store only encrypted representations of passwords.
1 rule found Severity: High

AlmaLinux OS 9 must be configured so that the Pluggable Authentication Module is configured to store only encrypted representations of passwords.
1 rule found Severity: High

AlmaLinux OS 9 must be configured so that interactive user account passwords are using strong password hashes.
1 rule found Severity: High

For container platform using password authentication, the application must store only cryptographic representations of passwords.
1 rule found Severity: Medium

The DBMS must for password-based authentication, store passwords using an approved salted key derivation function, preferably using a keyed hash.
1 rule found Severity: High

2 rules found Severity: High

1 rule found Severity: High

1 rule found Severity: High

1 rule found Severity: High

1 rule found Severity: Medium

If passwords are used for authentication, MariaDB must store only hashed, salted representations of passwords.
1 rule found Severity: High

1 rule found Severity: High

1 rule found Severity: High

1 rule found Severity: High

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

RHEL 8 must encrypt all stored passwords with a FIPS 140-2 approved cryptographic hashing algorithm.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

RHEL 9 must be configured so that user and group account administration utilities are configured to store only encrypted representations of passwords.
1 rule found Severity: Medium

RHEL 9 must be configured to use the shadow file to store only encrypted representations of passwords.
1 rule found Severity: Medium

The SUSE operating system must employ FIPS 140-2-approved cryptographic hashing algorithms for all stored passwords.
2 rules found Severity: Medium

The SUSE operating system must configure the Linux Pluggable Authentication Modules (PAM) to only store encrypted representations of passwords.
2 rules found Severity: Medium

The SUSE operating system must employ FIPS 140-3 approved cryptographic hashing algorithms for all stored passwords.
2 rules found Severity: Medium

1 rule found Severity: Medium

RHEL 9 pam_unix.so module must be configured in the password-auth file to use a FIPS 140-3 approved cryptographic hashing algorithm for system authentication.
1 rule found Severity: Medium

Systems must employ cryptographic hashes for passwords using the SHA-2 family of algorithms or FIPS 140-2 approved successors.
2 rules found Severity: Medium

For UEM server using password authentication, the application must store only cryptographic representations of passwords.
1 rule found Severity: Medium

For site-to-site, VPN Gateway must be configured to store only cryptographic representations of pre-shared Keys (PSKs).
1 rule found Severity: Medium

1 rule found Severity: High

Rancher MCM must use a centralized user management solution to support account management functions. For accounts using password authentication, the container platform must use FIPS-validated SHA-2 or later protocol to protect the integrity of the password authentication process.
1 rule found Severity: High
