Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-69165 | VNSX-ND-000015 | SV-83769r1_rule | Medium |
Description |
---|
By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute forcing, is reduced. |
STIG | Date |
---|---|
VMware NSX Manager Security Technical Implementation Guide | 2016-06-27 |
Check Text ( C-69603r1_chk ) |
---|
Verify vCenter Server is configured to a limit of three consecutive invalid logon attempts by a Single Sign-On user and Active Directory user during a 15-minute time period. Log on to vSphere Web Client with credentials authorized for administration, navigate and select Administration >> Single Sign-On >> Configuration >> Policies >> Lockout Policy. View the values for the lockout policies. The following lockout policies must be set as follows: Maximum number of failed logon attempts: 3 Time interval between failures: 900 seconds Unlock time: 0 If any of these account lockout policies are not configured in Single Sign-On and Active Directory as stated, this is a finding. |
Fix Text (F-75351r1_fix) |
---|
Change vCenter Server configuration to a limit of three consecutive invalid logon attempts by a Single Sign-On and Active Directory user during a 15-minute time period. Log on to vSphere Web Client with credentials authorized for administration, navigate and select Administration >> Single Sign-On >> Configuration >> Policies >> Lockout Policy. View the values for the lockout policies. The following lockout policies must be set as follows: Maximum number of failed logon attempts: 3 Time interval between failures: 900 seconds Unlock time: 0 Ensure Active Directory is configured with these account lockout settings as stated. |