SOL-11.1-040280 - User accounts must be locked after 35 days of inactivity.

Information

Attackers that are able to exploit an inactive account can potentially obtain and maintain undetected access to an application. Owners of inactive accounts will not notice if unauthorized access to their user account has been obtained. Operating systems need to track periods of user inactivity and disable accounts after 35 days of inactivity. Such a process greatly reduces the risk that accounts will be hijacked, leading to a data compromise.

This policy does not apply to either emergency accounts or infrequently used accounts. Infrequently used accounts are local logon accounts used by system administrators when network or normal logon/access is not available. Emergency accounts are administrator accounts created in response to crisis situations.

Satisfies: SRG-OS-000003, SRG-OS-000118

Solution

The root role is required.

Perform the following to implement the recommended state:

# useradd -D -f 35

To set this policy on a user account, use the command(s):

# usermod -f 35 [username]

To set this policy on a role account, use the command(s):

# rolemod -f 35 [name]

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_SOL_11_SPARC_V2R9_STIG.zip

Item Details

Category: ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

References: 800-53|AC-2(3), 800-53|IA-4e., CAT|II, CCI|CCI-000017, CCI|CCI-000795, Rule-ID|SV-216344r603267_rule, STIG-ID|SOL-11.1-040280, STIG-Legacy|SV-60951, STIG-Legacy|V-48079, Vuln-ID|V-216344

Plugin: Unix

Control ID: ae0617b3ebaf8bdf8b319557bfcd31cc80571fad66e1dd3280accdf2b9f4975e