UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The SLES for vRealize must prohibit password reuse for a minimum of five generations - old passwords are being stored.


Overview

Finding ID Version Rule ID IA Controls Severity
V-89587 VRAU-SL-000405 SV-100237r1_rule Medium
Description
Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. If the information system or application allows the user to consecutively reuse their password when that password has exceeded its defined lifetime, the end result is a password that is not changed as per policy requirements.
STIG Date
VMware vRealize Automation 7.x SLES Security Technical Implementation Guide 2018-10-12

Details

Check Text ( C-89279r2_chk )
Verify that the old password file "opasswd" exists, by running the following command:

# ls /etc/security/opasswd

If "/etc/security/opasswd" does not exist, this is a finding.
Fix Text (F-96329r2_fix)
Create the password history file.

# touch /etc/security/opasswd
# chown root:root /etc/security/opasswd
# chmod 0600 /etc/security/opasswd