1.80 UBTU-22-411045

Information

The operating system must automatically lock an account until the locked account is released by an administrator when three unsuccessful logon attempts have been made.

GROUP ID: V-260549
RULE ID: SV-260549r958388

By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-forcing, is reduced. Limits are imposed by locking the account.

Satisfies: SRG-OS-000021-GPOS-00005, SRG-OS-000329-GPOS-00128

Solution

Configure the operating system to utilize the "pam_faillock" module.

Add or modify the following lines in the "/etc/pam.d/common-auth" file, below the "auth" definition for "pam_unix.so":

auth [default=die] pam_faillock.so authfail
auth sufficient pam_faillock.so authsucc

Configure the "pam_faillock" module to use the following options.

Add or modify the following lines in the "/etc/security/faillock.conf" file:

audit
silent
deny = 3
fail_interval = 900
unlock_time = 0

See Also

https://workbench.cisecurity.org/benchmarks/22168

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-7a., 800-53|AC-7b., CAT|III, CCI|CCI-000044, CCI|CCI-002238, CSCv7|16.7, Rule-ID|SV-260549r958388_rule, STIG-ID|UBTU-22-411045, Vuln-ID|V-260549

Plugin: Unix

Control ID: a1081715ce2b6ad46cec001e6cc6c4ecee53931e8235d93f28211f67c480d31f