Check: RHEL-09-631020
RHEL 9 STIG:
RHEL-09-631020
(in versions v1 r3 through v1 r1)
Title
RHEL 9 must prohibit the use of cached authenticators after one day. (Cat II impact)
Discussion
If cached authentication information is out-of-date, the validity of the authentication information may be questionable.
Check Content
Verify that the System Security Services Daemon (SSSD) prohibits the use of cached authentications after one day. Note: If smart card authentication is not being used on the system, this requirement is Not Applicable. Check that SSSD allows cached authentications with the following command: $ sudo grep cache_credentials /etc/sssd/sssd.conf cache_credentials = true If "cache_credentials" is set to "false" or missing from the configuration file, this is not a finding and no further checks are required. If "cache_credentials" is set to "true", check that SSSD prohibits the use of cached authentications after one day with the following command: $ sudo grep offline_credentials_expiration /etc/sssd/sssd.conf offline_credentials_expiration = 1 If "offline_credentials_expiration" is not set to a value of "1", this is a finding.
Fix Text
Configure the SSSD to prohibit the use of cached authentications after one day. Add or change the following line in "/etc/sssd/sssd.conf" just below the line [pam]: offline_credentials_expiration = 1
Additional Identifiers
Rule ID: SV-258133r926386_rule
Vulnerability ID: V-258133
Group Title: SRG-OS-000383-GPOS-00166
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-002007 |
The information system prohibits the use of cached authenticators after an organization-defined time period. |
Controls
Number | Title |
---|---|
IA-5 (13) |
Expiration Of Cached Authenticators |