UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The option to use passwords that are randomly generated by the DSN component is available but not being used.


Overview

Finding ID Version Rule ID IA Controls Severity
V-7968 DSN13.12 SV-8454r1_rule ECSC-1 IAIA-1 IAIA-2 unknown
Description
Requirement: The IAO will ensure that users will be prompted by the system three times to change their passwords before or after the password has reached the maximum password lifetime. If the user fails to change their password, their account will be disabled. Randomly generated passwords are preferred over user-defined passwords because a user-defined password has more potential to be guessed.
STIG Date
Defense Switched Network STIG 2015-01-02

Details

Check Text ( C-7372r1_chk )
Have the IAO or SA demonstrate compliance with the requirement; minimally on a sampling of the related or effected devices. Inspect configuration files as applicable.
Fix Text (F-7543r1_fix)
Configure the system to randomly generate user passwords if the system provides this functionality.