GEN000460 - The system must disable accounts after three consecutive unsuccessful login attempts - RETRIES

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Disabling accounts after a limited number of unsuccessful login attempts improves protection against password guessing attacks.

Solution

Set RETRIES to 3 in the /etc/default/login file.
#vi /etc/default/login

Set LOCK_AFTER_RETRIES to YES in the /etc/security/policy.conf file.
#vi /etc/security/policy.conf

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_SOL_10_x86_V2R2_STIG.zip

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-7, CAT|II, CCI|CCI-000044, CSCv6|16.7, Rule-ID|SV-220074r603266_rule, STIG-ID|GEN000460, STIG-Legacy|SV-39815, STIG-Legacy|V-766, Vuln-ID|V-220074

Plugin: Unix

Control ID: 149177aea38fd07ae45ff0ef83f178ed8b11f45d465e2c4176894fd4218f3ceb