Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-48257 | KNOX-29-015200 | SV-61129r1_rule | Low |
Description |
---|
Users must not be able to override the system policy on the maximum number of consecutive failed authentication attempts because this could allow them to raise the maximum, thus giving adversaries more chances to guess/brute force passwords, which increases the risk of the mobile device being compromised. Therefore, only administrators and the MDM software should have the authority to set consecutive failed authentication attempt policies. SFR ID: FMT_SMF.1.1 #02 |
STIG | Date |
---|---|
Samsung Android (with Knox 1.x) STIG | 2014-04-22 |
Check Text ( C-50689r2_chk ) |
---|
This validation procedure is performed on the MDM Administration Console only. Check whether the device lock screen setting is configured on the MDM server. 1. Ask the MDM administrator to display the "Maximum Failed Attempts" field in the "Android Knox Container Password Restrictions" rule. 2. Verify the value of the setting is 10 or less. If there is no value configured for the "Maximum Failed Attempts" field, or if it is greater than 10, this is a finding. |
Fix Text (F-51865r2_fix) |
---|
Configure the mobile operating system to allow only 10 or less consecutive failed authentication attempts. On the MDM Administration Console, set the "Maximum Failed Attempts" to the organization-defined value in the "Android Knox Container Password Restrictions" rule. |