UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The Palo Alto Networks security platform must not use Password Profiles.


Overview

Finding ID Version Rule ID IA Controls Severity
V-62779 PANW-NM-000142 SV-77269r1_rule Medium
Description
Password profiles override settings made in the Minimum Password Complexity window. If Password Profiles are used they can bypass password complexity requirements.
STIG Date
Palo Alto Networks NDM Security Technical Implementation Guide 2016-06-30

Details

Check Text ( C-63587r1_chk )
Go to Device >> Password Profiles
If there are configured Password Profiles, this is a finding.
Fix Text (F-68699r1_fix)
Go to Device >> Password Profiles
If the screen is blank (no configured Password Profiles), do nothing.

If there are configured Password Profiles, identify which accounts are using them and bring this to the attention of the ISSO immediately.
Delete the Password Profiles when authorized to make changes to the device in accordance with local change management policies.