Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
SRG-NET-000163-NDM-000120 | SRG-NET-000163-NDM-000120 | SRG-NET-000163-NDM-000120_rule | Medium |
Description |
---|
To ensure only the assigned individual is using the account, the account holder must create a strong password that is privately maintained and changed based on the organizationally defined frequency. Password strength is a measure of the effectiveness of a password in resisting guessing, dictionary attacks, and brute-force attacks. A password must have an expiration date to limit the amount of time a compromised password can be used by a malicious user. This control applies to accounts configured or controlled by the network device itself. |
STIG | Date |
---|---|
Network Device Management Security Requirements Guide | 2013-07-30 |
Check Text ( C-SRG-NET-000163-NDM-000120_chk ) |
---|
If authentication functionality is provided by the underlying platform's account management system or by a network authentication server rather than the network device application itself, this is not a finding. View the password configuration for local user accounts. Verify the system is configured so the value for the maximum password lifetime restriction is set to an organizationally defined value. If the value for the maximum lifetime restriction is not set to an organizationally defined value, this is a finding. |
Fix Text (F-SRG-NET-000163-NDM-000120_fix) |
---|
Configure the account passwords so the value for the maximum lifetime restriction is set to an organizationally defined value. |