UCF STIG Viewer Logo

The network element must enforce the organization-defined time period during which the limit of consecutive invalid access attempts by a user is counted.


Overview

Finding ID Version Rule ID IA Controls Severity
V-26799 SRG-NET-000039 SV-34049r1_rule Medium
Description
A malicious or unauthorized user could gain access to a network element by guessing or using methods such as dictionary attack, word list substitution, or brute force attack—all of which require multiple attempts. By limiting the number of failed login attempts within a defined period of time, the risk of unauthorized system access via user password guessing can be mitigated.
STIG Date
Network Security Requirements Guide 2011-12-28

Details

Check Text ( None )
None
Fix Text (None)
None