5.4.1.9 Ensure password expiration is 60 Day maximum for exisiting passwords

Information

The operating system must be configured so that existing passwords are restricted to a 60-day maximum lifetime.

Rationale:

Any password, no matter how complex, can eventually be cracked. Therefore, passwords need to be changed periodically. If the operating system does not limit the lifetime of passwords and force users to change their passwords, there is the risk that the operating system passwords could be compromised.

Solution

Configure non-compliant accounts to enforce a 60-day maximum password lifetime restriction.
Using the list or accounts collected in the Audit and run this command on the Users:

# chage -M 60 [user]

Notes:

This Benchmark recommendation maps to:

Red Hat Enterprise Linux 7 Security Technical Implementation Guide:

Version 2, Release: 3 Benchmark Date: 26 Apr 2019



Vul ID: V-71931

Rule ID: SV-86555r3_rule

STIG ID: RHEL-07-010260

Severity: CAT II

See Also

https://workbench.cisecurity.org/files/2688

Item Details

Category: IDENTIFICATION AND AUTHENTICATION

References: 800-53|IA-5(1)(d)

Plugin: Unix

Control ID: 8f15cca603a1029d12dab017c69359296124c6d9b51a5d31d3026c0b84a2a888