Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-246826 | HYCU-AC-000008 | SV-246826r768142_rule | Medium |
Description |
---|
By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-forcing, is reduced. |
STIG | Date |
---|---|
HYCU for Nutanix Security Technical Implementation Guide | 2021-08-03 |
Check Text ( C-50258r768140_chk ) |
---|
Log on to the HYCU VM console and go to the "/etc/pam.d/" folder. Verify that "password-auth" and "system-auth" contain the following three lines, and the values for deny and unlock_time are as shown. Commands: sudo grep pam_faillock.so /etc/pam.d/password-auth sudo grep pam_faillock.so /etc/pam.d/system-auth Both should displays the following three lines: auth required pam_faillock.so preauth silent audit deny=3 even_deny_root fail_interval=60 unlock_time=900 auth required pam_faillock.so authfail audit unlock_time=900 account required pam_faillock.so If the required content is not present, this is a finding. |
Fix Text (F-50212r768141_fix) |
---|
Go to the "/etc/pam.d/" folder. Move the current configuration and make new copies to be edited by executing the following commands: sudo mv password-auth password-auth-as sudo mv system-auth system-auth-as sudo cp password-auth-as password-auth sudo cp system-auth-as system-auth Edit the files "password-auth" and "system-auth". Add the lines: auth required pam_faillock.so preauth silent audit deny=3 even_deny_root fail_interval=60 unlock_time=900 after line auth required pam_env.so Add: auth required pam_faillock.so authfail audit unlock_time=900 after auth sufficient pam_unix.so nullok try_first_pass Add: account required pam_faillock.so before account required pam_unix.so The files "system-auth" and "password-auth" are identical, so the procedure can be done on one of the files and copied to the second one. Restart sssd service: sudo systemctl restart sssd.service |