GEN000700 - User passwords must be changed at least every 60 days - configured

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Limiting the lifespan of authenticators limits the period of time an unauthorized user has access to the system while using compromised credentials and reduces the period of time available for password-guessing attacks to run against a single password.

Solution

Set the max days field to 60 for all user accounts.
# passwd -x 60 <user>
Set the MAXWEEKS parameter in /etc/default/passwd to a positive, non-zero value of 8 or less.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_SOL_10_x86_V2R2_STIG.zip

Item Details

Category: IDENTIFICATION AND AUTHENTICATION

References: 800-53|IA-5(1), CAT|II, CCI|CCI-000199, Rule-ID|SV-227591r603266_rule, STIG-ID|GEN000700, STIG-Legacy|SV-39845, STIG-Legacy|V-11976, Vuln-ID|V-227591

Plugin: Unix

Control ID: 192d363aae17fb213fdeb070b740bb847fb182a7411fc4346405210c3886c3a9