Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-64991 | DBNW-DM-000015 | SV-79481r1_rule | Medium |
Description |
---|
By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-forcing, is reduced. It is possible to set a time-to-retry variable, as well as number of retries during that lockout timeout variable, within the DBN-6300. |
STIG | Date |
---|---|
DBN-6300 NDM Security Technical Implementation Guide | 2017-09-15 |
Check Text ( C-65649r2_chk ) |
---|
To see if the system will lock out the user if three failed logon attempts occur within 15 minutes, attempt to log on as a user three times in succession and deliberately fail (by entering the wrong password). After the third attempt, the user will be locked out from retrying until the oldest attempt (by time) ages out past the 15-minute mark and then will be allowed to try again. If the user is not locked out after three failed logon attempts within 15 minutes, this is a finding. |
Fix Text (F-70931r2_fix) |
---|
Set a time-to-retry variable, as well as number of retries during that lockout timeout variable, within the DBN-6300 through the CLI. This value is set with the following registry entry in the CLI: reg set /sysconfig/auth/01 {"stores": { "local": { "policies": { "passwordFail": { "enable": true, "threshold": 3, "windowSeconds": 60 }}}}} |