UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The Samsung SDS EMM local accounts must prohibit password reuse for a minimum of five generations.


Overview

Finding ID Version Rule ID IA Controls Severity
V-245529 SSDS-00-200220 SV-245529r836816_rule Medium
Description
Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. To meet password policy requirements, passwords need to be changed at specific policy-based intervals. If the information system or application allows the user to consecutively reuse their password when that password has exceeded its defined lifetime, the end result is a password that is not changed as per policy requirements. SFR ID: FMT_SMF.1(2)b. / IA-5 (1) (e)
STIG Date
Samsung SDS EMM Security Technical Implementation Guide 2022-06-10

Details

Check Text ( C-48803r836815_chk )
Verify Samsung SDS EMM local accounts have been configured to prohibit password reuse for a minimum of five generations.

1. Log in to the SDS EMM console.
2. Go to Setting >> Server >> Configuration >> Manage Password History (Times).
3. Verify the Manage Password History (Times) is set to 5.

If the Manage Password History (Times) is not set to 5, this is a finding.
Fix Text (F-48760r744408_fix)
Configure Samsung SDS EMM local accounts to prohibit password reuse for a minimum of five generations. On the MDM console, do the following:

1. Log in to the SDS EMM console.
2. Go to Setting >> Server >> Configuration >> Manage Password History (Times).
3. Set the Manage Password History (Times) to 5.
4. Save setting.