UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

All non-interactive/automated processing account passwords must be changed at least once per year or be locked.


Overview

Finding ID Version Rule ID IA Controls Severity
V-11977 GEN000740 SV-38211r1_rule IAIA-1 IAIA-2 Medium
Description
Limiting the lifespan of authenticators limits the period of time an unauthorized user has access to the system while using compromised credentials and reduces the period of time available for password-guessing attacks to run against a single password. Locking the password for non-interactive and automated processing accounts is preferred as it removes the possibility of accessing the account by a password. On some systems, locking the passwords of these accounts may prevent the account from functioning properly. Passwords for non-interactive/automated processing accounts must not be used for direct logon to the system.
STIG Date
HP-UX 11.31 Security Technical Implementation Guide 2015-03-18

Details

Check Text ( C-36296r1_chk )
NOTE: This will always require a manual review. This is a local policy issue/question. Ask the Systems Administrator (SA) if there are any automated processing accounts on the system. If there are, ask the SA if the passwords for those automated accounts are changed at least once a year. If SA indicates passwords for automated processing accounts are not changed once per year, this is a finding
Fix Text (F-31546r1_fix)
Implement or establish procedures to change the passwords of automated processing accounts at least once per year.