UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The SLES for vRealize must store only encrypted representations of passwords.


Overview

Finding ID Version Rule ID IA Controls Severity
V-240399 VRAU-SL-000370 SV-240399r670938_rule High
Description
Passwords need to be protected at all times, and encryption is the standard method for protecting passwords. If passwords are not encrypted, they can be plainly read (i.e., clear text) and easily compromised.
STIG Date
VMware vRealize Automation 7.x SLES Security Technical Implementation Guide 2021-06-24

Details

Check Text ( C-43632r670936_chk )
Check that the user account passwords are stored hashed using sha512 by running the following command:

# cat /etc/default/passwd | grep CRYPT=sha512

If "CRYPT=sha512" is not listed, this is a finding.
Fix Text (F-43591r670937_fix)
Ensure password are being encrypted with hash sha512 with the following command:

# echo 'CRYPT=sha512'>>/etc/default/passwd