UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

User passwords must be changed at least every 60 days.


Overview

Finding ID Version Rule ID IA Controls Severity
V-11976 GEN000700 SV-39845r3_rule IAIA-1 IAIA-2 Medium
Description
Limiting the lifespan of authenticators limits the period of time an unauthorized user has access to the system while using compromised credentials and reduces the period of time available for password-guessing attacks to run against a single password.
STIG Date
Solaris 10 X86 Security Technical Implementation Guide 2014-07-09

Details

Check Text ( C-38769r2_chk )
Check the max days field (the 5th field) of /etc/shadow.
# awk -F: '{print $1 ":" $5;}' /etc/shadow
If the max days field is equal to 0 or greater than 60 for any account that is not password-locked, this is a finding.
Fix Text (F-33984r2_fix)
Set the max days field to 60 for all user accounts.
# passwd -x 60
Set the MAXWEEKS parameter in /etc/default/passwd to a positive, non-zero value of 8 or less.