Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-254592 | AIOS-16-006900 | SV-254592r862032_rule | Medium |
Description |
---|
The more attempts an adversary has to guess a password, the more likely the adversary will enter the correct password and gain access to resources on the device. Setting a limit on the number of attempts mitigates this risk. Setting the limit at 10 or less gives authorized users the ability to make a few mistakes when entering the password but still provides adequate protection against dictionary or brute force attacks on the password. SFR ID: FMT_SMF_EXT.1.1 #2c, FIA_AFL_EXT.1.5 |
STIG | Date |
---|---|
Apple iOS-iPadOS 16 Security Technical Implementation Guide | 2023-02-15 |
Check Text ( C-58203r862030_chk ) |
---|
Review configuration settings to confirm that consecutive failed authentication attempts is set to 10 or fewer. This procedure is performed in the Apple iOS/iPadOS management tool and on the iPhone and iPad. Note: If an organization has multiple configuration profiles, the check procedure must be performed on the relevant configuration profiles applicable to the scope of the review. In the Management tool, verify the "Maximum number of failed attempts" value is set to 10 or fewer. Alternatively, verify the text " On the iPhone and iPad: 1. Open the Settings app. 2. Tap "General". 3. Tap "Profiles & Device Management" or "Profiles". 4. Tap the Configuration Profile from the iOS management tool containing the password policy. 5. Tap "Restrictions". 6. Tap "Passcode". 7. Verify "Max failed attempts" is listed as "10" or fewer. If the "Maximum number of failed attempts" is more than 10 in the iOS management tool, " |
Fix Text (F-58149r862031_fix) |
---|
Install a configuration profile to allow only 10 or fewer consecutive failed authentication attempts. |