AIX7-00-001130 - AIX must enforce password complexity by requiring that at least one special character be used - default user

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity or strength is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks.

Password complexity is one factor in determining how long it takes to crack a password. The more complex the password, the greater the number of possible combinations that need to be tested before the password is compromised.

Special characters are those characters that are not alphanumeric. Examples include: ~ ! @ # $ % ^ *.

Solution

From the command prompt, run the following command to set 'minspecialchar=1' for the default stanza in '/etc/security/user':
# chsec -f /etc/security/user -s default -a minspecialchar=1

Run the following command to re-check 'minspecialchar' values for all users:
# lsuser -a minspecialchar ALL

For each user who has 'minspecialchar=0', set its 'minspecialchar' to '1' by running the following command from command prompt:
# chsec -f /etc/security/user -s [user_name] -a minspecialchar=1

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_IBM_AIX_7-x_V2R6_STIG.zip

Item Details

References: CAT|II, CCI|CCI-001619, Rule-ID|SV-215227r808442_rule, STIG-ID|AIX7-00-001130, STIG-Legacy|SV-101583, STIG-Legacy|V-91485, Vuln-ID|V-215227

Plugin: Unix

Control ID: 06daf0e55d892d6996e81b54a51d579a4363c87cbc46a976bd38bd258485471d