Check: APPL-12-003008
Apple macOS 12 (Monterey) STIG:
APPL-12-003008
(in versions v1 r8 through v1 r1)
Title
The macOS system must enforce a 60-day maximum password lifetime restriction. (Cat II impact)
Discussion
Any password, no matter how complex, can eventually be cracked. Therefore, passwords need to be changed periodically. One method of minimizing this risk is to use complex passwords and periodically change them. If the operating system does not limit the lifetime of passwords and force users to change their passwords, there is the risk that the operating system passwords could be compromised.
Check Content
To check the currently applied policies for passwords and accounts, use the following command: /usr/sbin/system_profiler SPConfigurationProfileDataType | /usr/bin/grep maxPINAgeInDays If "maxPINAgeInDays" is set a value greater than "60", this is a finding.
Fix Text
This setting is enforced using the "Passcode Policy" configuration profile.
Additional Identifiers
Rule ID: SV-252521r816377_rule
Vulnerability ID: V-252521
Group Title: SRG-OS-000076-GPOS-00044
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000199 |
The information system enforces maximum password lifetime restrictions. |
Controls
Number | Title |
---|---|
IA-5 (1) |
Password-Based Authentication |