STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 2 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← IA-5 (1) — Authenticator Management

CCI-002041

Definition

The information system allows the use of a temporary password for system logons with an immediate change to a permanent password.

Parent Control

IA-5 (1)Authenticator ManagementIdentification and Authentication

Linked STIG Checks (19)

V-256842CAT IICompliance Guardian must provide automated mechanisms for supporting account management functions.AvePoint Compliance Guardian Security Technical Implementation GuideV-255504CAT IIThe CA API Gateway must not have any default manufacturer passwords when deployed.CA API Gateway NDM Security Technical Implementation GuideV-219183CAT IIThe Ubuntu operating system must allow the use of a temporary password for system logons with an immediate change to a permanent password.Canonical Ubuntu 18.04 LTS Security Technical Implementation GuideV-235780CAT IILDAP integration in Docker Enterprise must be configured.Docker Enterprise 2.x Linux/UNIX Security Technical Implementation GuideV-229008CAT IIThe BIG-IP appliance must be configured to allow the use of a temporary password for system logons with an immediate change to a permanent password.F5 BIG-IP Device Management Security Technical Implementation GuideV-234209CAT IIThe FortiGate device must not have any default manufacturer passwords when deployed.Fortinet FortiGate Firewall NDM Security Technical Implementation GuideV-230178CAT IIThe HP FlexFabric Switch must allow the use of a temporary password for system logons with an immediate change to a permanent password.HP FlexFabric Switch NDM Security Technical Implementation GuideV-252577CAT IIIBM Aspera Faspex must allow the use of a temporary password for logins with an immediate change to a permanent password.IBM Aspera Platform 4.2 Security Technical Implementation GuideV-223958CAT IICA-TSS ACID creation must use the EXP option.IBM z/OS TSS Security Technical Implementation GuideV-74199CAT IIThe process by which the Solidcore client Command Line Interface (CLI) Access Password is made available to administrators when needed must be documented in the organizations written policy.McAfee Application Control 7.x Security Technical Implementation GuideV-237436CAT IIThe Microsoft SCOM server must use an active directory group that contains authorized members of the SCOM Administrators Role Group.Microsoft SCOM Security Technical Implementation GuideV-237437CAT IIThe default Builtin\Administrators group must be removed from the SCOM Administrators Role Group.Microsoft SCOM Security Technical Implementation GuideV-243136CAT IIThe network device must not have any default manufacturer passwords when deployed.Network WLAN AP-IG Management Security Technical Implementation GuideV-243154CAT IIThe network device must not have any default manufacturer passwords when deployed.Network WLAN AP-NIPR Management Security Technical Implementation GuideV-243172CAT IIThe network device must not have any default manufacturer passwords when deployed.Network WLAN Bridge Management Security Technical Implementation GuideV-243190CAT IIThe network device must not have any default manufacturer passwords when deployed.Network WLAN Controller Management Security Technical Implementation GuideV-254093CAT IInnoslate must use multifactor authentication for network access to privileged and non-privileged accounts.SPEC Innovations Innoslate 4.x Security Technical Implementation GuideV-94705CAT IISymantec ProxySG must not have a default manufacturer passwords when deployed.Symantec ProxySG NDM Security Technical Implementation GuideV-69167CAT IThe NSX Manager must not have any default manufacturer passwords when deployed.VMware NSX Manager Security Technical Implementation Guide