Check: APSC-DV-000530
Application Security and Development STIG:
APSC-DV-000530
(in versions v5 r3 through v4 r2)
Title
The application must enforce the limit of three consecutive invalid logon attempts by a user during a 15 minute time period. (Cat I impact)
Discussion
By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute forcing, is reduced. Limits are imposed by locking the account. User notification when three failed logon attempts are exceeded is an operational consideration determined by the application owner. In some instances the operational situation may dictate that no notice is to be provided to the user when their account is locked. In other situations, the user may be notified their account is now locked. This decision is left to the application owner based upon their operational scenarios.
Check Content
All testing must be performed within a 15-minute window. Log on to the application with a test user account. Intentionally enter an incorrect user password or pin. Repeat 2 times within 15 minutes for a total of three failed attempts. Notification of a locked account may or may not be provided. Using the correct user password or pin, attempt to logon a 4th time. If the logon is successful upon the 4th attempt the account was not locked after the third failed attempt and this is a finding.
Fix Text
Configure the application to enforce an account lock after 3 failed logon attempts occurring within a 15-minute window.
Additional Identifiers
Rule ID: SV-222432r879546_rule
Vulnerability ID: V-222432
Group Title: SRG-APP-000065
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000044 |
The information system enforces the organization-defined limit of consecutive invalid logon attempts by a user during the organization-defined time period. |
Controls
Number | Title |
---|---|
AC-7 |
Unsuccessful Logon Attempts |