UCF STIG Viewer Logo

The DBN-6300 must enforce the limit of three consecutive invalid logon attempts by a user during a 15-minute time period.


Overview

Finding ID Version Rule ID IA Controls Severity
V-64991 DBNW-DM-000015 SV-79481r1_rule Medium
Description
By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-forcing, is reduced. It is possible to set a time-to-retry variable, as well as number of retries during that lockout timeout variable, within the DBN-6300.
STIG Date
DBN-6300 NDM Security Technical Implementation Guide 2017-09-15

Details

Check Text ( C-65649r2_chk )
To see if the system will lock out the user if three failed logon attempts occur within 15 minutes, attempt to log on as a user three times in succession and deliberately fail (by entering the wrong password).

After the third attempt, the user will be locked out from retrying until the oldest attempt (by time) ages out past the 15-minute mark and then will be allowed to try again.

If the user is not locked out after three failed logon attempts within 15 minutes, this is a finding.
Fix Text (F-70931r2_fix)
Set a time-to-retry variable, as well as number of retries during that lockout timeout variable, within the DBN-6300 through the CLI.

This value is set with the following registry entry in the CLI:

reg set /sysconfig/auth/01 {"stores": { "local": { "policies": { "passwordFail": { "enable": true, "threshold": 3, "windowSeconds": 60 }}}}}