Check: SSDS-00-200220
Samsung SDS EMM STIG:
SSDS-00-200220
(in versions v1 r3 through v1 r2)
Title
The Samsung SDS EMM local accounts must prohibit password reuse for a minimum of five generations. (Cat II impact)
Discussion
Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. To meet password policy requirements, passwords need to be changed at specific policy-based intervals. If the information system or application allows the user to consecutively reuse their password when that password has exceeded its defined lifetime, the end result is a password that is not changed as per policy requirements. SFR ID: FMT_SMF.1(2)b. / IA-5 (1) (e)
Check Content
Verify Samsung SDS EMM local accounts have been configured to prohibit password reuse for a minimum of five generations. 1. Log in to the SDS EMM console. 2. Go to Setting >> Server >> Configuration >> Manage Password History (Times). 3. Verify the Manage Password History (Times) is set to 5. If the Manage Password History (Times) is not set to 5, this is a finding.
Fix Text
Configure Samsung SDS EMM local accounts to prohibit password reuse for a minimum of five generations. On the MDM console, do the following: 1. Log in to the SDS EMM console. 2. Go to Setting >> Server >> Configuration >> Manage Password History (Times). 3. Set the Manage Password History (Times) to 5. 4. Save setting.
Additional Identifiers
Rule ID: SV-245529r836816_rule
Vulnerability ID: V-245529
Group Title: PP-MDM-991000
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000200 |
The information system prohibits password reuse for the organization-defined number of generations. |
Controls
Number | Title |
---|---|
IA-5(1) |
Password-based Authentication |