WN12-AC-000005 - The maximum password age must meet requirements.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

The longer a password is in use, the greater the opportunity for someone to gain unauthorized knowledge of the passwords. Scheduled changing of passwords hinders the ability of unauthorized system users to crack passwords and gain access to a system.

Solution

Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Account Policies -> Password Policy -> 'Maximum password age' to '60' days or less (excluding '0' which is unacceptable).

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_Windows_2012_and_2012_R2_MS_V3R3_STIG.zip

Item Details

Category: IDENTIFICATION AND AUTHENTICATION

References: 800-53|IA-5(1)(d), CAT|II, CCI|CCI-000199, CSCv6|16.5, Rule-ID|SV-225270r569185_rule, STIG-ID|WN12-AC-000005, STIG-Legacy|SV-52851, STIG-Legacy|V-1104, Vuln-ID|V-225270

Plugin: Windows

Control ID: 2f192f4c6d2be3fcb34c001439e71f64cde53f9aa5a8e4e906876645a1e949d7