UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The IDPS must enforce maximum password lifetime restrictions.


Overview

Finding ID Version Rule ID IA Controls Severity
SRG-NET-000163-IDPS-000145 SRG-NET-000163-IDPS-000145 SRG-NET-000163-IDPS-000145_rule Medium
Description
Authorization for access to any IDPS requires an approved and assigned individual account identifier. To ensure only the assigned individual is using the account, the account holder must create a strong password that is privately maintained and changed based on the organizationally defined frequency. Password strength is a measure of the effectiveness of a password in resisting guessing, dictionary attacks, as well as, brute-force attacks. A password must have an expiration date to limit the amount of time a compromised password can be used by a malicious user.
STIG Date
IDPS Security Requirements Guide (SRG) 2012-03-08

Details

Check Text ( C-43284_chk )
View the password configuration for local user accounts.
Verify the system is configured so the value for the maximum password lifetime restriction is set to an organizationally defined value.

If the value for the maximum lifetime restriction is not set to an organizationally defined value, this is a finding.
Fix Text (F-43284_fix)
Configure the account passwords so the value for the maximum lifetime restriction is not set to an organizationally defined value.