Check: APPL-14-003009
Apple macOS 14 (Sonoma) STIG:
APPL-14-003009
(in versions v1 r2 through v1 r1)
Title
The macOS system must prohibit password reuse for a minimum of five generations. (Cat II impact)
Discussion
The macOS must be configured to enforce a password history of at least five previous passwords when a password is created. This rule ensures that users are not allowed to reuse a password that was used in any of the five previous password generations. Limiting password reuse protects against malicious users attempting to gain access to the system via brute-force hacking methods. Note: The guidance for password-based authentication in NIST 800-53 (Rev 5) and NIST 800-63B state that complexity rules should be organizationally defined. The values defined are based on common complexity values, but an organization may define its own password complexity rules.
Check Content
Verify the macOS system is configured to prohibit password reuse for a minimum of five generations with the following command: /usr/bin/pwpolicy -getaccountpolicies 2> /dev/null | /usr/bin/tail +2 | /usr/bin/xmllint --xpath '//dict/key[text()="policyAttributePasswordHistoryDepth"]/following-sibling::*[1]/text()' - | /usr/bin/awk '{ if ($1 >= 5 ) {print "yes"} else {print "no"}}' If the result is not "yes", this is a finding.
Fix Text
Configure the macOS system to prohibit password reuse for five generations by installing the "com.apple.mobiledevice.passwordpolicy" configuration profile.
Additional Identifiers
Rule ID: SV-259539r941239_rule
Vulnerability ID: V-259539
Group Title: SRG-OS-000077-GPOS-00045
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000200 |
The information system prohibits password reuse for the organization-defined number of generations. |
Controls
Number | Title |
---|---|
IA-5 (1) |
Password-Based Authentication |