UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The MDM server must enforce the organization defined limit of consecutive invalid access attempts by an administrator during the organization defined time period.


Overview

Finding ID Version Rule ID IA Controls Severity
V-36009 SRG-APP-065-MDM-004-SRV SV-47398r1_rule High
Description
Anytime an authentication method is exposed so as to allow for the utilization of an application, there is a risk that attempts will be made to obtain unauthorized access. One of the most prevalent ways an attacker tries to gain access to a system is by repeatedly trying to access an account and guessing a password. To reduce the risk of malicious access attempts being successful, the MDM server must define and limit the number of times a user account may consecutively fail a login attempt within a defined time period. By limiting the number of failed login attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-force attack, is reduced.
STIG Date
Mobile Device Manager Security Requirements Guide 2013-01-24

Details

Check Text ( C-44248r1_chk )
Review the MDM server configuration to determine whether the number of consecutive invalid access attempts is limited to the organization defined value. If the number of invalid attempts is not set, or is set to something different than the organization defined value, this is a finding.
Fix Text (F-40539r1_fix)
Configure the MDM server to limit the number of consecutive invalid access attempts by an administrator.