UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The Workspace ONE UEM local accounts must prohibit password reuse for a minimum of five generations.


Overview

Finding ID Version Rule ID IA Controls Severity
V-251262 VMW1-00-200150 SV-251262r805089_rule High
Description
Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. To meet password policy requirements, passwords need to be changed at specific policy-based intervals. If the information system or application allows the user to consecutively reuse their password when that password has exceeded its defined lifetime, the end result is a password that is not changed as per policy requirements. SFR ID: FMT_SMF.1(2)b. / IA-5 (1) (e)
STIG Date
VMware Workspace ONE UEM Security Technical Implementation Guide 2021-11-04

Details

Check Text ( C-54697r805087_chk )
Verify WS1 UEM is configured to prohibit password reuse for a minimum of five generations for local account passwords for the emergency local account.

1. Log in to the WS1UEM console.
2. Go to Settings >> Admin >> Console Security >> Passwords.
3. Verify "Enforced password history" to "5 passwords remembered".

If WS1 UEM is not configured to prohibit password reuse for a minimum of five generations for local account passwords, this is a finding.
Fix Text (F-54651r805088_fix)
Configure WS1 UEM to prohibit password reuse for a minimum of five generations for local account passwords for the emergency local account.

1. Log in to the WS1UEM console.
2. Go to Settings >> Admin >> Console Security >> Passwords.
3. Configure "Enforced password history" to "5 passwords remembered".