PANW-NM-000092 - The Palo Alto Networks security platform must automatically lock the account until the locked account is released by an administrator when three unsuccessful logon attempts in 15 minutes are exceeded.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-forcing, is reduced. Limits are imposed by locking the account.

This should not be configured in Device >> Setup >> Management >> Authentication Settings; instead, an authentication profile should be configured with lockout settings of three failed attempts and a lockout time of zero minutes. The Lockout Time is the number of minutes that a user is locked out if the number of failed attempts is reached (0-60 minutes, default 0). 0 means that the lockout is in effect until it is manually unlocked.

Solution

This should not be configured in Device >> Setup >> Management >> Authentication Settings; instead, an authentication profile should be configured with lockout settings of three failed attempts and a lockout time of zero minutes.
Go to Device >> Authentication Profile
Select the configured authentication profile, or select 'Add' (in the bottom-left corner of the pane) to create a new one.
In the 'Authentication Profile' field, enter the name of the authentication profile that will be used to control each person's authentication process.
The 'Lockout Time (min)' field is the lockout duration; this must be set to '0'. This will keep the lockout in effect until it is manually unlocked.
In the 'Failed Attempts' field, enter '3'.
Select 'OK'.

Apply the authentication profile to the Administrator accounts.
Go to Device >> Administrators
Select each configured account, or select 'Add' (in the bottom-left corner of the pane) to create a new one.
In the 'Authentication Profile' field, enter the configured authentication profile.
Select 'OK'.

This authentication profile should not be applied to the emergency administration account since it has special requirements.
Commit changes by selecting 'Commit' in the upper-right corner of the screen.
Select 'OK' when the confirmation dialog appears.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_PAN_Y22M04_STIG.zip

Item Details

References: CAT|II, CCI|CCI-000366, CCI|CCI-002238, Rule-ID|SV-228660r513585_rule, STIG-ID|PANW-NM-000092, STIG-Legacy|SV-77237, STIG-Legacy|V-62747, Vuln-ID|V-228660

Plugin: Palo_Alto

Control ID: 73af4da7457dd04444441d7132ad4ff4b597597bd032d5adad5eeb32aa4a1916