UCF STIG Viewer Logo

The IDPS must enforce password complexity by the number of numeric characters used.


Overview

Finding ID Version Rule ID IA Controls Severity
V-34674 SRG-NET-000157-IDPS-00115 SV-45550r1_rule Low
Description
To ensure only the assigned individual is using the account, the account holder must create a strong password that is privately maintained and changed based on the organizationally defined frequency. Password strength is a measure of the effectiveness of a password in resisting guessing, dictionary attacks, as well as, brute-force attacks. Combination of upper case, lower case, numbers, and special characters enhances the complexity of the password string. This control applies to passwords configured or controlled by the IDPS itself.
STIG Date
Intrusion Detection and Prevention Systems (IDPS) Security Requirements Guide 2012-11-19

Details

Check Text ( C-42899r1_chk )
If authentication functionality is provided by the underlying platform's account management system or by a network authentication server rather than the IDPS application itself, this is not a finding.

Review the IDPS configuration and settings to determine whether passwords contain the organization defined number of numeric characters.

If the IDPS does not force the password to have the organization defined number of numeric characters, this is a finding.
Fix Text (F-38947r1_fix)
Configure the IDPS implementation to enforce password complexity by the number of numeric characters used.