Check: TOSS-04-040120
Tri-Lab Operating System Stack (TOSS) 4 STIG:
TOSS-04-040120
(in versions v2 r1 through v1 r1)
Title
TOSS must enforce a 60-day maximum password lifetime restriction. (Cat II impact)
Discussion
Any password, no matter how complex, can eventually be cracked. Therefore, passwords need to be changed periodically. If the operating system does not limit the lifetime of passwords and force users to change their passwords, there is the risk that the operating system passwords could be compromised.
Check Content
Verify that TOSS enforces a 60-day maximum password lifetime for new user accounts by running the following command: $ sudo grep -i pass_max_days /etc/login.defs PASS_MAX_DAYS 60 If the "PASS_MAX_DAYS" parameter value is greater than "60", or commented out, this is a finding.
Fix Text
Configure TOSS to enforce a 60-day maximum password lifetime. Add, or modify the following line in the "/etc/login.defs" file: PASS_MAX_DAYS 60
Additional Identifiers
Rule ID: SV-253067r986598_rule
Vulnerability ID: V-253067
Group Title: SRG-OS-000076-GPOS-00044
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000199 |
The information system enforces maximum password lifetime restrictions. |
CCI-004066 |
For password-based authentication, enforce organization-defined composition and complexity rules. |
Controls
Number | Title |
---|---|
IA-5(1) |
Password-based Authentication |