UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The Central Log Server must be configured to prohibit password reuse for a minimum of five generations.


Overview

Finding ID Version Rule ID IA Controls Severity
V-81335 SRG-APP-000165-AU-002580 SV-96049r1_rule Low
Description
Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. To meet password policy requirements, passwords need to be changed at specific policy-based intervals. If the information system or application allows the user to consecutively reuse their password when that password has exceeded its defined lifetime, the end result is a password that is not changed as per policy requirements.
STIG Date
Central Log Server Security Requirements Guide 2019-06-28

Details

Check Text ( C-81039r1_chk )
Examine the configuration.

Verify the Central Log Server is configured to prohibit password reuse for a minimum of five generations.

If the Central Log Server is not configured to prohibit password reuse for a minimum of five generations, this is a finding.
Fix Text (F-88119r1_fix)
Configure the Central Log Server to prohibit password reuse for a minimum of five generations.