Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-76199 | CACT-NM-000034 | SV-90887r1_rule | Medium |
Description |
---|
Any password, no matter how complex, can eventually be cracked. Therefore, passwords need to be changed at specific intervals. One method of minimizing this risk is to use complex passwords and periodically change them. If the network device does not limit the lifetime of passwords and force users to change their passwords, there is the risk that the passwords could be compromised. This requirement does not include root account or the account of last resort which are meant for access to the network device in case of failure. |
STIG | Date |
---|---|
ForeScout CounterACT NDM Security Technical Implementation Guide | 2017-09-19 |
Check Text ( C-75885r1_chk ) |
---|
Determine if CounterACT enforces a 60-day maximum password lifetime. This requirement may be verified by demonstration or configuration review. This requirement does not include root account or the account of last resort. 1. Log on to the CounterACT Administrator UI. 2. From the menu, select Tools >> Options >> User Console and Options >> Password and Login. 3. Verify the "password expires after" radio button is selected and configured to 60 days. If CounterACT does not enforce a 60-day maximum password lifetime, this is a finding. |
Fix Text (F-82837r1_fix) |
---|
Configure CounterACT to enforce a 60-day maximum password lifetime. 1. Log on to the CounterACT Administrator UI. 2. From the menu, select Tools >> Options >> User Console and Options >> Password and Login. 3. Verify the "password expires after" radio button is selected and configured to 60 days. This requirement does not include root account or the account of last resort. |