UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The SLES for vRealize must prohibit password reuse for a minimum of five generations - old passwords are being stored.


Overview

Finding ID Version Rule ID IA Controls Severity
V-240405 VRAU-SL-000405 SV-240405r670956_rule Medium
Description
Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. If the information system or application allows the user to consecutively reuse their password when that password has exceeded its defined lifetime, the end result is a password that is not changed as per policy requirements.
STIG Date
VMware vRealize Automation 7.x SLES Security Technical Implementation Guide 2021-06-24

Details

Check Text ( C-43638r670954_chk )
Verify that the old password file "opasswd" exists, by running the following command:

# ls /etc/security/opasswd

If "/etc/security/opasswd" does not exist, this is a finding.
Fix Text (F-43597r670955_fix)
Create the password history file.

# touch /etc/security/opasswd
# chown root:root /etc/security/opasswd
# chmod 0600 /etc/security/opasswd