STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 2 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← IA-5 (1) — Authenticator Management

CCI-004064

Definition

For password-based authentication, allow user selection of long passwords and passphrases, including spaces and all printable characters.

Parent Control

IA-5 (1)Authenticator ManagementIdentification and Authentication

Linked STIG Checks (29)

V-263536CAT IIFor password-based authentication, AAA Services must be configured to allow user selection of long passwords and passphrases, including spaces and all printable characters.AAA Services Security Requirements GuideV-274133CAT IIAmazon Linux 2023 must enforce password complexity by requiring that at least one uppercase character be used.Amazon Linux 2023 Security Technical Implementation GuideV-274134CAT IIAmazon Linux 2023 must enforce password complexity by requiring that at least one lowercase character be used.Amazon Linux 2023 Security Technical Implementation GuideV-274135CAT IIAmazon Linux 2023 must enforce password complexity by requiring that at least one numeric character be used.Amazon Linux 2023 Security Technical Implementation GuideV-274136CAT IIAmazon Linux 2023 must require the change of at least 50 percent of the total number of characters when passwords are changed.Amazon Linux 2023 Security Technical Implementation GuideV-274137CAT IIAmazon Linux 2023 must enforce a minimum 15-character password length.Amazon Linux 2023 Security Technical Implementation GuideV-274138CAT IIAmazon Linux 2023 must enforce password complexity by requiring that at least one special character be used.Amazon Linux 2023 Security Technical Implementation GuideV-272627CAT IIICylanceON-PREM must be configured to use a third-party identity provider.Arctic Wolf CylanceON-PREM Security Technical Implementation GuideV-276012CAT IAx-OS must have no local accounts for the user interface.Axonius Federal Systems Ax-OS Security Technical Implementation GuideV-263579CAT IIThe Central Log Server must for password-based authentication, allow user selection of long passwords and passphrases, including spaces and all printable characters.Central Log Server Security Requirements GuideV-271958CAT IIThe Cisco ACI must be configured to allow user selection of long passwords and passphrases, including spaces and all printable characters, for password-based authentication.Cisco ACI NDM Security Technical Implementation GuideV-242633CAT IIThe Cisco ISE must be configured to use an external authentication server to authenticate administrators prior to granting administrative access.Cisco ISE NDM Security Technical Implementation GuideV-263596CAT IIThe container platform must for password-based authentication, allow user selection of long passwords and passphrases, including spaces and all printable characters.Container Platform Security Requirements GuideV-263615CAT IIThe DBMS must, for password-based authentication, allow user selection of long passwords and passphrases, including spaces and all printable characters.Database Security Requirements GuideV-263638CAT IIThe DNS server implementation must, for password-based authentication, allow user selection of long passwords and passphrases, including spaces and all printable characters.Domain Name System (DNS) Security Requirements GuideV-230952CAT IIForescout must be configured to use an authentication server for the purpose of authenticating users prior to granting administrative access.Forescout Network Device Management Security Technical Implementation GuideV-263655CAT IIThe operating system must for password-based authentication, allow user selection of long passwords and passphrases, including spaces and all printable characters.General Purpose Operating System Security Requirements GuideV-258600CAT IThe ICS must be configured to prevent nonprivileged users from executing privileged functions.Ivanti Connect Secure NDM Security Technical Implementation GuideV-253941CAT IThe Juniper EX switch must be configured to use an authentication server for the purpose of authenticating users prior to granting administrative access.Juniper EX Series Switches Network Device Management Security Technical Implementation GuideV-223206CAT IIThe Juniper SRX Services Gateway must be configured to use an authentication server to centrally manage authentication and logon settings for remote and nonlocal access.Juniper SRX Services Gateway NDM Security Technical Implementation GuideV-263680CAT IIThe Mainframe Product must, for password-based authentication, allow user selection of long passwords and passphrases, including spaces and all printable characters.Mainframe Product Security Requirements GuideV-264301CAT IIThe network device must be configured to allow user selection of long passwords and passphrases, including spaces and all printable characters for password-based authentication.Network Device Management Security Requirements GuideV-275467CAT IIThe Riverbed NetIM must be configured to allow user selection of long passwords and passphrases, including spaces and all printable characters for password-based authentication.Riverbed NetIM NDM Security Technical Implementation GuideV-275656CAT IIUbuntu OS must be configured so that when passwords are changed or new passwords are established, pwquality must be used.Riverbed NetIM OS Security Technical Implementation GuideV-279276CAT IIThe Edge SWG must be configured to allow user selection of long passwords and passphrases, including spaces and all printable characters for password-based authentication.Symantec Edge SWG NDM Security Technical Implementation GuideV-242254CAT IThe TippingPoint SMS must be configured to use an authentication server for the purpose of authenticating users prior to granting administrative access and to enforce access restrictions.Trend Micro TippingPoint NDM Security Technical Implementation GuideV-264320CAT IIThe VMM must for password-based authentication, allow user selection of long passwords and passphrases, including spaces and all printable characters.Virtual Machine Manager Security Requirements GuideV-264351CAT IIThe web server must, for password-based authentication, allow user selection of long passwords and passphrases, including spaces and all printable characters.Web Server Security Requirements GuideV-269574CAT IXylok Security Suite must use a centralized user management solution.Xylok Security Suite 20.x Security Technical Implementation Guide