UCF STIG Viewer Logo

User passwords must be changed at least every 60 days.


Overview

Finding ID Version Rule ID IA Controls Severity
V-227591 GEN000700 SV-227591r603266_rule Medium
Description
Limiting the lifespan of authenticators limits the period of time an unauthorized user has access to the system while using compromised credentials and reduces the period of time available for password-guessing attacks to run against a single password.
STIG Date
Solaris 10 X86 Security Technical Implementation Guide 2020-12-04

Details

Check Text ( C-29753r488321_chk )
Check the max days field (the 5th field) of /etc/shadow.
# awk -F: '{print $1 ":" $5;}' /etc/shadow
If the max days field is equal to 0 or greater than 60 for any account that is not password-locked, this is a finding.
Fix Text (F-29741r488322_fix)
Set the max days field to 60 for all user accounts.
# passwd -x 60
Set the MAXWEEKS parameter in /etc/default/passwd to a positive, non-zero value of 8 or less.