|Finding ID||Version||Rule ID||IA Controls||Severity|
|By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-force attacks, is reduced. Limits are imposed by locking the account.|
|IBM z/OS RACF Security Technical Implementation Guide||2022-09-19|
|Check Text ( C-25369r514776_chk )|
| From the ISPF Command Shell enter: |
If the PASSWORD(REVOKE) value shows "AFTER
If the PASSWORD(REVOKE) value is not enabled and is not set to either "1" or "2", this is a finding.
|Fix Text (F-25357r853601_fix)|
| Ensure that PASSWORD(REVOKE) SETROPTS value is set to "1" or "2". This specifies the number of consecutive incorrect password attempts RACF allows before it revokes the USERID on the next incorrect attempt. If REVOKE is specified, ensure INITSTATS are in effect. |
Evaluate the impact associated with implementation of the control option. Develop a plan of action to implement the control option as specified in the example below:
The RACF Command SETR LIST will show the status of RACF Controls including PASSWORD REVOKE.
Set the password REVOKE to "2" invalid attempts activated with the command SETR PASSWORD(REVOKE(2)).