UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The SLES for vRealize must enforce a delay of at least 4 seconds between logon prompts following a failed logon attempt.


Overview

Finding ID Version Rule ID IA Controls Severity
V-240549 VRAU-SL-001525 SV-240549r671388_rule Medium
Description
Limiting the number of logon attempts over a certain time interval reduces the chances that an unauthorized user may gain access to an account.
STIG Date
VMware vRealize Automation 7.x SLES Security Technical Implementation Guide 2021-06-24

Details

Check Text ( C-43782r671386_chk )
Verify the SLES for vRealize enforces a delay of at least "4" seconds between logon prompts following a failed logon attempt.

Verify the use of the "pam_faildelay" module.

# grep pam_faildelay /etc/pam.d/common-auth*

The typical configuration looks something like this:

#delay is in micro seconds
auth required pam_faildelay.so delay=4000000

If the line is not present, this is a finding.
Fix Text (F-43741r671387_fix)
Configure the SLES for vRealize to enforce a delay of at least "4" seconds between logon prompts following a failed logon attempt with the following command:

# sed -i "/^[^#]*pam_faildelay.so/ c\auth required pam_faildelay.so delay=4000000" /etc/pam.d/common-auth-vmware.local