Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-243105 | VCTR-67-000046 | SV-243105r850127_rule | Medium |
Description |
---|
By limiting the number of failed login attempts within a specified time period, the risk of unauthorized access via user password guessing, otherwise known as brute forcing, is reduced. Limits are imposed by locking the account. |
STIG | Date |
---|---|
VMware vSphere 6.7 vCenter Security Technical Implementation Guide | 2022-09-09 |
Check Text ( C-46380r719556_chk ) |
---|
From the vSphere Client, go to Administration >> Single Sign-On >> Configuration >> Policies >> Lockout Policy. View the values for the lockout policies. The following lockout policy should be set at follows: Time interval between failures: 900 seconds If this lockout policy is not configured as stated, this is a finding. |
Fix Text (F-46337r719557_fix) |
---|
From the vSphere Client go to Administration >> Single Sign-On >> Configuration >> Policies >> Lockout Policy. Click "Edit". Set the "Time interval between failures" to "900" and click "OK". |