UCF STIG Viewer Logo

The network element must enforce the organization-defined limit of consecutive invalid access attempts by a user during the organization-defined time period.


Overview

Finding ID Version Rule ID IA Controls Severity
V-26798 SRG-NET-000038 SV-34048r1_rule Medium
Description
A malicious or unauthorized user could gain access to a network element by guessing or using methods such as dictionary attack, word list substitution, or brute force attack—all of which require multiple attempts. By limiting the number of failed login attempts within a defined period of time, the risk of unauthorized system access via user password guessing can be mitigated.
STIG Date
Network Security Requirements Guide 2011-12-28

Details

Check Text ( None )
None
Fix Text (None)
None