Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-77071 | SLES-12-010130 | SV-91767r2_rule | Medium |
Description |
---|
By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-force attacks, is reduced. Limits are imposed by locking the account. |
STIG | Date |
---|---|
SLES 12 Security Technical Implementation Guide | 2018-09-27 |
Check Text ( C-76681r2_chk ) |
---|
Verify the SUSE operating system locks a user account until the locked account is released by an administrator after three consecutive failed logon attempts. Check that the systems locks a user account after three consecutive failed login attempts with the following command: # grep pam_tally2.so /etc/pam.d/login auth required pam_tally2.so deny=3 If the "deny" option is greater than "3" or is missing, this is a finding. |
Fix Text (F-83769r2_fix) |
---|
Configure the SUSE operating system to lock a user account until the locked account is released by an administrator after three consecutive failed logon attempts. Add or modify the following line in the auth section of the "/etc/pam.d/login" file (or other services being used) to match the following: auth required pam_tally2.so deny=3 |