RHEL-09-411090 - RHEL 9 must maintain an account lock until the locked account is released by an administrator.

Information

By limiting the number of failed logon attempts the risk of unauthorized system access via user password guessing, otherwise known as brute-forcing, is reduced. Limits are imposed by locking the account.

Satisfies: SRG-OS-000329-GPOS-00128, SRG-OS-000021-GPOS-00005

Solution

Configure RHEL 9 to lock an account until released by an administrator after three unsuccessful logon attempts with the command:

$ authselect enable-feature with-faillock

Then edit the '/etc/security/faillock.conf' file as follows:

unlock_time = 0

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_RHEL_9_V1R3_STIG.zip

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-7a., 800-53|AC-7b., CAT|II, CCI|CCI-000044, CCI|CCI-002238, Rule-ID|SV-258057r926158_rule, STIG-ID|RHEL-09-411090, Vuln-ID|V-258057

Plugin: Unix

Control ID: 7dc8c0a7b9c55f5d6c017b8fd0336d1bc9e324f367be3acada0785bb4d7098cf