Check: SRG-APP-000165-UEM-000095
Unified Endpoint Management Server SRG:
SRG-APP-000165-UEM-000095
(in versions v2 r3 through v1 r1)
Title
The UEM server must prohibit password reuse for a minimum of five generations. (Cat II impact)
Discussion
Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. To meet password policy requirements, passwords need to be changed at specific policy-based intervals. If the information system or application allows the user to consecutively reuse their password when that password has exceeded its defined lifetime, the end result is a password that is not changed as per policy requirements. Satisfies:FMT_SMF.1(2)b Reference:PP-MDM-431025
Check Content
Verify the UEM server prohibits password reuse for a minimum of five generations. If the UEM server does not prohibit password reuse for a minimum of five generations, this is a finding.
Fix Text
Configure the UEM server to prohibit password reuse for a minimum of five generations.
Additional Identifiers
Rule ID: SV-234368r1015267_rule
Vulnerability ID: V-234368
Group Title: SRG-APP-000165
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-004061 |
For password-based authentication, verify when users create or update passwords, that the passwords are not found on the list of commonly-used, expected, or compromised passwords in IA-5 (1) (a). |
Controls
Number | Title |
---|---|
No controls are assigned to this check |