Information
The operating system must automatically lock an account until the locked account is released by an administrator when three unsuccessful logon attempts have been made.
GROUP ID: V-260549
RULE ID: SV-260549r958388
By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-forcing, is reduced. Limits are imposed by locking the account.
Satisfies: SRG-OS-000021-GPOS-00005, SRG-OS-000329-GPOS-00128
Solution
Configure the operating system to utilize the "pam_faillock" module.
Add or modify the following lines in the "/etc/pam.d/common-auth" file, below the "auth" definition for "pam_unix.so":
auth [default=die] pam_faillock.so authfail
auth sufficient pam_faillock.so authsucc
Configure the "pam_faillock" module to use the following options.
Add or modify the following lines in the "/etc/security/faillock.conf" file:
audit
silent
deny = 3
fail_interval = 900
unlock_time = 0