RHEL-10-600425 - RHEL 10 must maintain an account lock until the locked account is released by an administrator.

Information

By limiting the number of failed login attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-forcing, is reduced. Limits are imposed by locking the account.

Satisfies: SRG-OS-000329-GPOS-00128, SRG-OS-000021-GPOS-00005

Solution

Configure RHEL 10 to lock an account after three unsuccessful login attempts until released by an administrator with the following command:

$ authselect enable-feature with-faillock

Edit the "/etc/security/faillock.conf" file as follows:

unlock_time = 0

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_RHEL_10_V1R1_STIG.zip

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-7a., 800-53|AC-7b., CAT|II, CCI|CCI-000044, CCI|CCI-002238, Rule-ID|SV-281197r1166543_rule, STIG-ID|RHEL-10-600425, Vuln-ID|V-281197

Plugin: Unix

Control ID: acf3df9e2df47eb5cfaf66c048577e07129e57054efa32bcafd564d391de62fb