Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-54239 | AIOS-01-080005 | SV-68485r1_rule | Low |
Description |
---|
Users must not be able to override the system policy on the maximum number of consecutive failed authentication attempts because this could allow them to raise the maximum, thus giving adversaries more chances to guess/brute-force passwords, which increases the risk of the mobile device being compromised. Therefore, only administrators should have the authority to set consecutive failed authentication attempt policies. SFR ID: FMT_SMF.1.1 #02 |
STIG | Date |
---|---|
Apple iOS 8 Interim Security Configuration Guide | 2014-09-16 |
Check Text ( C-54875r3_chk ) |
---|
Review configuration settings to confirm the consecutive failed authentication attempts is set to 10 or fewer. This procedure is performed in the iOS management tool and on the iOS device. Note: If an organization has multiple configuration profiles, then the check procedure must be performed on the relevant configuration profiles applicable to the scope of the review. In the Management tool, verify the "Maximum number of failed attempts" value is set to 10 or fewer. Alternatively, verify the text " On the iOS device: 1. Open the Settings app. 2. Tap "General". 3. Tap "Profiles" or "Profiles & Device Management" or "Device Management". 4. Tap the Configuration Profile from the iOS management tool containing the password policy. 5. Tap "Restrictions". 6. Tap "Passcode". 7. Verify "Max failed attempts" is listed as "10" or fewer. If the "Maximum number of failed attempts" is more than 10 in the iOS management tool, " |
Fix Text (F-59093r1_fix) |
---|
Install a Configuration Profile to allow only 10 or fewer consecutive failed authentication attempts. |