5.5.1.8 Ensure password expiration is 60 Day maximum for existing passwords

Information

The operating system must be configured so that existing passwords are restricted to a 60-day maximum lifetime.

Rationale:

Any password, no matter how complex, can eventually be cracked. Therefore, passwords need to be changed periodically. If the operating system does not limit the lifetime of passwords and force users to change their passwords, there is the risk that the operating system passwords could be compromised.

Solution

Configure non-compliant accounts to enforce a 60-day maximum password lifetime restriction.
Using the list or accounts collected in the Audit and run this command on the Users:

# chage -M 60 [user]

Additional Information:

Red Hat Enterprise Linux 7 Security Technical Implementation Guide

Version 3, Release: 4 Benchmark Date: 23 Jul 2021

Vul ID: V-204421

Rule ID: SV-204421r603261_rule

STIG ID: RHEL-07-010260

Severity: CAT II

See Also

https://workbench.cisecurity.org/files/3636

Item Details

Category: IDENTIFICATION AND AUTHENTICATION

References: 800-53|IA-5(1)(d), CCI|CCI-000199, CSCv7|4.4, Rule-ID|SV-204421r603261_rule, STIG-ID|RHEL-07-010260

Plugin: Unix

Control ID: cc0f8a49cdedf8ac71cf90bbd531b0e2736bbc7dc6a80169f421c625c4ebdfcc