UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The network device must prohibit password reuse for the organizationally defined number of generations.


Overview

Finding ID Version Rule ID IA Controls Severity
SRG-NET-000154-NDM-000111 SRG-NET-000154-NDM-000111 SRG-NET-000154-NDM-000111_rule Medium
Description
Authorization for access to any network device requires an approved and assigned individual account identifier. To ensure only the assigned individual is using the account, the account holder must create a strong password that is privately maintained and changed based on the organizationally defined frequency. A password must have an expiration date to limit the amount of time a compromised password can be used by a malicious user. This control applies to passwords configured or controlled by the network device itself.
STIG Date
Network Device Management Security Requirements Guide 2013-07-30

Details

Check Text ( C-SRG-NET-000154-NDM-000111_chk )
If authentication functionality is provided by the underlying platform's account management system or by a network authentication server rather than the network device application itself, this is not a finding.

Review the network device account management configuration and settings to determine whether password reuse for the organizationally defined number of generations is prohibited.

If the network device configuration does not prohibit password reuse for the organizationally defined number of generations, this is a finding.
Fix Text (F-SRG-NET-000154-NDM-000111_fix)
Configure the network device to prohibit password reuse for the organizationally defined number of generations.