Check: AOSX-09-002085
Apple OS X 10.9 Workstation STIG:
AOSX-09-002085
(in version v1 r2)
Title
Operating systems must enforce a 60-day maximum password lifetime restriction. (Cat II impact)
Discussion
Any password, no matter how complex, can eventually be cracked. Therefore, passwords need to be changed periodically. One method of minimizing this risk is to use complex passwords and periodically change them. If the operating system does not limit the lifetime of passwords and force users to change their passwords, there is the risk that the operating system passwords could be compromised.
Check Content
To check if the password policy is configured to require that users change their password every 60 days, run the following command: sudo pwpolicy getglobalpolicy | tr ' ' '\n' | grep maxMinutesUntilChangePassword If the result is not 'maxMinutesUntilChangePassword=86400', and password policy is not controlled by a directory server, this is a finding.
Fix Text
To set the password policy, run the following command: sudo pwpolicy setglobalpolicy 'maxMinutesUntilChangePassword=86400'
Additional Identifiers
Rule ID: SV-72921r1_rule
Vulnerability ID: V-58491
Group Title:
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000199 |
The information system enforces maximum password lifetime restrictions. |
Controls
Number | Title |
---|---|
IA-5 (1) |
Password-Based Authentication |