STIGhub
STIGs
RMF Controls
Compare
← IA-5 (1) — Authenticator Management
CCI-000200
Definition
The information system prohibits password reuse for the organization-defined number of generations.
Parent Control
IA-5 (1)
Authenticator Management
Identification and Authentication
Linked STIG Checks (48)
V-76497
CAT II
The Akamai Luna Portal must prohibit password reuse for a minimum of five generations.
Akamai KSD Service Impact Level 2 NDM Security Technical Implementation Guide
V-259768
CAT I
Apple iOS/iPadOS 17 must be configured to enforce a passcode reuse prohibition of at least two generations.
Apple iOS/iPadOS 17 MDFPP 3.3 BYOAD Security Technical Implementation Guide
V-252522
CAT II
The macOS system must prohibit password reuse for a minimum of five generations.
Apple macOS 12 (Monterey) Security Technical Implementation Guide
V-257228
CAT II
The macOS system must prohibit password reuse for a minimum of five generations.
Apple macOS 13 (Ventura) Security Technical Implementation Guide
V-237321
CAT I
The ArcGIS Server must use Windows authentication for supporting account management functions.
ArcGIS for Server 10.3 Security Technical Implementation Guide
V-272627
CAT III
CylanceON-PREM must be configured to use a third-party identity provider.
Arctic Wolf CylanceON-PREM Security Technical Implementation Guide
V-256842
CAT II
Compliance Guardian must provide automated mechanisms for supporting account management functions.
AvePoint Compliance Guardian Security Technical Implementation Guide
V-38711
CAT III
BlackBerry PlayBook OS must prohibit a user from reusing any of the last five previously used device unlock passwords.
BlackBerry PlayBook OS V2.1 Security Technical Implementation Guide
V-219180
CAT III
The Ubuntu operating system must prohibit password reuse for a minimum of five generations.
Canonical Ubuntu 18.04 LTS Security Technical Implementation Guide
V-255553
CAT II
The DBN-6300 must prohibit password reuse for a minimum of five generations.
DBN-6300 NDM Security Technical Implementation Guide
V-270910
CAT II
Dragos Platform must use an Identity Provider (IDP) for authentication and authorization processes.
Dragos Platform 2.x Security Technical Implementation Guide
V-228989
CAT II
The BIG-IP appliance must be configured to prohibit password reuse for a minimum of five generations.
F5 BIG-IP Device Management Security Technical Implementation Guide
V-255645
CAT II
CounterACT must prohibit password reuse for a minimum of five generations.
ForeScout CounterACT NDM Security Technical Implementation Guide
V-230167
CAT II
The HP FlexFabric Switch must prohibit password reuse for a minimum of five generations.
HP FlexFabric Switch NDM Security Technical Implementation Guide
V-252567
CAT II
IBM Aspera Console passwords must be prohibited from reuse for a minimum of five generations.
IBM Aspera Platform 4.2 Security Technical Implementation Guide
V-252585
CAT II
IBM Aspera Faspex passwords must be prohibited from reuse for a minimum of five generations.
IBM Aspera Platform 4.2 Security Technical Implementation Guide
V-65093
CAT II
The DataPower Gateway must prohibit password reuse for a minimum of five generations.
IBM DataPower Network Device Management Security Technical Implementation Guide
V-24356
CAT II
The PASSWORD History Count value must be set to 10 or greater.
IBM Hardware Management Console (HMC) STIG
V-255740
CAT II
The MQ Appliance network device must prohibit password reuse for a minimum of five generations.
IBM MQ Appliance v9.0 NDM Security Technical Implementation Guide
V-237913
CAT II
CA VM:Secure product PASSWORD user exit must be coded with the PWLIST option properly set.
IBM zVM Using CA VM:Secure Security Technical Implementation Guide
V-251408
CAT II
The Ivanti MobileIron Core server must prohibit password reuse for a minimum of four generations.
Ivanti MobileIron Core MDM Server Security Technical Implementation Guide
V-213895
CAT II
If SQL Server authentication, using passwords, is employed, SQL Server must enforce the DoD standards for password lifetime.
MS SQL Server 2014 Instance Security Technical Implementation Guide
V-74219
CAT II
The use of a Solidcore 7.x local Command Line Interface (CLI) Access Password must be documented in the organizations written policy.
McAfee Application Control 7.x Security Technical Implementation Guide
V-220742
CAT II
The password history must be configured to 24 passwords remembered.
Microsoft Windows 10 Security Technical Implementation Guide
V-224869
CAT II
Windows Server 2016 password history must be configured to 24 passwords remembered.
Microsoft Windows Server 2016 Security Technical Implementation Guide
V-254220
CAT II
Nutanix AOS must prohibit password reuse for a minimum of five generations.
Nutanix AOS 5.20.x OS Security Technical Implementation Guide
V-237727
CAT II
The DBMS must support organizational requirements to prohibit password reuse for the organization-defined number of generations.
Oracle Database 12c Security Technical Implementation Guide
V-204422
CAT II
The Red Hat Enterprise Linux operating system must be configured so that passwords are prohibited from reuse for a minimum of five generations.
Red Hat Enterprise Linux 7 Security Technical Implementation Guide
V-261384
CAT II
SLEM 5 must not allow passwords to be reused for a minimum of five generations.
SUSE Linux Enterprise Micro (SLEM) 5 Security Technical Implementation Guide
V-261390
CAT II
SLEM 5 must employ a password history file.
SUSE Linux Enterprise Micro (SLEM) 5 Security Technical Implementation Guide
V-4084
CAT II
The system must prohibit the reuse of passwords within five iterations.
SUSE Linux Enterprise Server v11 for System z Security Technical Implementation Guide
V-245529
CAT II
The Samsung SDS EMM local accounts must prohibit password reuse for a minimum of five generations.
Samsung SDS EMM Security Technical Implementation Guide
V-69177
CAT II
The NSX vCenter must prohibit password reuse for a minimum of five generations.
VMware NSX Manager Security Technical Implementation Guide
V-251262
CAT I
The Workspace ONE UEM local accounts must prohibit password reuse for a minimum of five generations.
VMware Workspace ONE UEM Security Technical Implementation Guide
V-240404
CAT II
The SLES for vRealize must prohibit password reuse for a minimum of five generations.
VMware vRealize Automation 7.x SLES Security Technical Implementation Guide
V-240405
CAT II
The SLES for vRealize must prohibit password reuse for a minimum of five generations - old passwords are being stored.
VMware vRealize Automation 7.x SLES Security Technical Implementation Guide
V-239501
CAT II
The SLES for vRealize must prohibit password reuse for a minimum of five generations.
VMware vRealize Operations Manager 6.x SLES Security Technical Implementation Guide
V-239502
CAT II
The SLES for vRealize must prohibit password reuse for a minimum of five generations. Ensure the old passwords are being stored.
VMware vRealize Operations Manager 6.x SLES Security Technical Implementation Guide
V-256398
CAT II
The ESXi host must prohibit the reuse of passwords within five iterations.
VMware vSphere 7.0 ESXi Security Technical Implementation Guide
V-256506
CAT II
The Photon operating system must prohibit password reuse for a minimum of five generations.
VMware vSphere 7.0 vCenter Appliance Photon OS Security Technical Implementation Guide
V-256586
CAT II
The Photon operating system must ensure the old passwords are being stored.
VMware vSphere 7.0 vCenter Appliance Photon OS Security Technical Implementation Guide
V-256326
CAT II
The vCenter Server must prohibit password reuse for a minimum of five generations.
VMware vSphere 7.0 vCenter Security Technical Implementation Guide
V-258735
CAT II
The ESXi host must prohibit password reuse for a minimum of five generations.
VMware vSphere 8.0 ESXi Security Technical Implementation Guide
V-258822
CAT II
The Photon operating system must prohibit password reuse for a minimum of five generations.
VMware vSphere 8.0 vCenter Appliance Photon OS 4.0 Security Technical Implementation Guide
V-258902
CAT II
The Photon operating system must be configured to use the pam_pwhistory.so module.
VMware vSphere 8.0 vCenter Appliance Photon OS 4.0 Security Technical Implementation Guide
V-73315
CAT II
Windows Server 2016 password history must be configured to 24 passwords remembered.
Windows Server 2016 Security Technical Implementation Guide
V-73315
CAT II
Windows Server 2016 password history must be configured to 24 passwords remembered.
Windows Server 2016 Security Technical Implementation Guide
V-93479
CAT II
Windows Server 2019 password history must be configured to 24 passwords remembered.
Windows Server 2019 Security Technical Implementation Guide