Check: VMW1-00-200150
VMware Workspace ONE UEM STIG:
VMW1-00-200150
(in version v2 r1)
Title
The Workspace ONE UEM local accounts must prohibit password reuse for a minimum of five generations. (Cat I impact)
Discussion
Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. To meet password policy requirements, passwords need to be changed at specific policy-based intervals. If the information system or application allows the user to consecutively reuse their password when that password has exceeded its defined lifetime, the end result is a password that is not changed as per policy requirements. SFR ID: FMT_SMF.1(2)b. / IA-5 (1) (e)
Check Content
Verify WS1 UEM is configured to prohibit password reuse for a minimum of five generations for local account passwords for the emergency local account. 1. Log in to the WS1UEM console. 2. Go to Settings >> Admin >> Console Security >> Passwords. 3. Verify "Enforced password history" to "5 passwords remembered". If WS1 UEM is not configured to prohibit password reuse for a minimum of five generations for local account passwords, this is a finding.
Fix Text
Configure WS1 UEM to prohibit password reuse for a minimum of five generations for local account passwords for the emergency local account. 1. Log in to the WS1UEM console. 2. Go to Settings >> Admin >> Console Security >> Passwords. 3. Configure "Enforced password history" to "5 passwords remembered".
Additional Identifiers
Rule ID: SV-251262r805089_rule
Vulnerability ID: V-251262
Group Title: PP-MDM-991000
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000200 |
The information system prohibits password reuse for the organization-defined number of generations. |
Controls
Number | Title |
---|---|
IA-5 (1) |
Password-Based Authentication |