800-53|AC-7b.

Title

UNSUCCESSFUL LOGON ATTEMPTS

Description

Automatically [Selection: locks the account/node for an [Assignment: organization-defined time period]; locks the account/node until released by an administrator; delays next logon prompt according to [Assignment: organization-defined delay algorithm]] when the maximum number of unsuccessful attempts is exceeded.

Reference Item Details

Category: ACCESS CONTROL

Family: ACCESS CONTROL

Baseline Impact: LOW,MODERATE,HIGH

Audit Items

View all Reference Audit Items

NamePluginAudit Name
1.1.3.6.1 Set 'Interactive logon: Machine account lockout threshold' to 10 or fewer invalid logon attemptsWindowsCIS Windows 8 L1 v1.0.0
1.2.1 - /etc/security/login.cfg - 'logininterval <= 300'UnixCIS AIX 5.3/6.1 L1 v1.1.0
1.2.2 - /etc/security/login.cfg - 'logindisable <= 10'UnixCIS AIX 5.3/6.1 L1 v1.1.0
1.2.5 - /etc/security/login.cfg - 'logindelay >= 10'UnixCIS AIX 5.3/6.1 L1 v1.1.0
1.4.2 Ensure 'Failed Attempts' and 'Lockout Time' for Authentication Profile are properly configured - Lockout TimePalo_AltoCIS Palo Alto Firewall 6 Benchmark L1 v1.0.0
1.4.2 Ensure 'Failed Attempts' and 'Lockout Time' for Authentication Profile are properly configured - Lockout TimePalo_AltoCIS Palo Alto Firewall 7 Benchmark L1 v1.0.0
1.47 UBTU-24-200610UnixCIS Ubuntu Linux 24.04 LTS STIG v1.0.0 CAT III
1.80 UBTU-22-411045UnixCIS Ubuntu Linux 22.04 LTS STIG v1.0.0 CAT III
1.136 OL08-00-020010UnixCIS Oracle Linux 8 STIG v1.0.0 CAT II
1.137 OL08-00-020011UnixCIS Oracle Linux 8 STIG v1.0.0 CAT II
1.138 OL08-00-020012UnixCIS Oracle Linux 8 STIG v1.0.0 CAT II
1.139 OL08-00-020013UnixCIS Oracle Linux 8 STIG v1.0.0 CAT II
1.140 OL08-00-020014UnixCIS Oracle Linux 8 STIG v1.0.0 CAT II
1.141 OL08-00-020015UnixCIS Oracle Linux 8 STIG v1.0.0 CAT II
1.142 OL08-00-020016UnixCIS Oracle Linux 8 STIG v1.0.0 CAT II
1.143 OL08-00-020017UnixCIS Oracle Linux 8 STIG v1.0.0 CAT II
1.144 OL08-00-020018UnixCIS Oracle Linux 8 STIG v1.0.0 CAT II
1.145 OL08-00-020019UnixCIS Oracle Linux 8 STIG v1.0.0 CAT II
1.146 OL08-00-020020UnixCIS Oracle Linux 8 STIG v1.0.0 CAT II
1.147 OL08-00-020021UnixCIS Oracle Linux 8 STIG v1.0.0 CAT II
1.148 OL08-00-020022UnixCIS Oracle Linux 8 STIG v1.0.0 CAT II
1.149 OL08-00-020023UnixCIS Oracle Linux 8 STIG v1.0.0 CAT II
1.151 OL08-00-020025UnixCIS Oracle Linux 8 STIG v1.0.0 CAT II
1.152 OL08-00-020026UnixCIS Oracle Linux 8 STIG v1.0.0 CAT II
1.153 OL08-00-020027UnixCIS Oracle Linux 8 STIG v1.0.0 CAT II
1.154 OL08-00-020028UnixCIS Oracle Linux 8 STIG v1.0.0 CAT II
1.279 RHEL-09-411075UnixCIS Red Hat Enterprise Linux 9 STIG v1.0.0 CAT II
1.280 RHEL-09-411080UnixCIS Red Hat Enterprise Linux 9 STIG v1.0.0 CAT II
1.281 RHEL-09-411085UnixCIS Red Hat Enterprise Linux 9 STIG v1.0.0 CAT II
1.282 RHEL-09-411090UnixCIS Red Hat Enterprise Linux 9 STIG v1.0.0 CAT II
3.4.2 /etc/security/login.cfg - logindelay - logindelayUnixCIS IBM AIX 7.1 L1 v2.1.0
4.003 - Time before bad-logon counter is reset does not meet minimum requirements.WindowsDISA Windows Vista STIG v6r41
4.004 - Lockout duration does not meet minimum requirements.WindowsDISA Windows Vista STIG v6r41
4.7.2 Ensure logindelay is configuredUnixCIS IBM AIX 7 v1.1.0 L1
5.2 Use LockOut RealmsUnixCIS Apache Tomcat 7 L2 v1.1.0 Middleware
5.2 Use LockOut RealmsUnixCIS Apache Tomcat 7 L2 v1.1.0
5.4.1.11 Ensure fail_delay is configuredUnixCIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIG
5.4.12 Ensure accounts lock for a minimum of 15 minutes after three unsuccessful logon attempts within a 15-minute timeframe - password-auth denyUnixCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
5.4.12 Ensure accounts lock for a minimum of 15 minutes after three unsuccessful logon attempts within a 15-minute timeframe - password-auth even_deny_rootUnixCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
5.4.12 Ensure accounts lock for a minimum of 15 minutes after three unsuccessful logon attempts within a 15-minute timeframe - password-auth fail_intervalUnixCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
5.4.12 Ensure accounts lock for a minimum of 15 minutes after three unsuccessful logon attempts within a 15-minute timeframe - password-auth unlock_timeUnixCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
5.4.12 Ensure accounts lock for a minimum of 15 minutes after three unsuccessful logon attempts within a 15-minute timeframe - system-auth denyUnixCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
5.4.12 Ensure accounts lock for a minimum of 15 minutes after three unsuccessful logon attempts within a 15-minute timeframe - system-auth even_deny_rootUnixCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
5.4.12 Ensure accounts lock for a minimum of 15 minutes after three unsuccessful logon attempts within a 15-minute timeframe - system-auth fail_intervalUnixCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
5.4.12 Ensure accounts lock for a minimum of 15 minutes after three unsuccessful logon attempts within a 15-minute timeframe - system-auth unlock_timeUnixCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
5.4.13 Ensure lockout for unsuccessful root logon attemptsUnixCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
5.4.13 Ensure lockout for unsuccessful root logon attempts - password-auth defaultUnixCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
5.4.13 Ensure lockout for unsuccessful root logon attempts - system-auth defaultUnixCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
5.4.13 Ensure lockout for unsuccessful root logon attempts - system-auth requiredUnixCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
AIX7-00-001003 - AIX must enforce the limit of three consecutive invalid login attempts by a user before the user account is locked and released by an administrator.UnixDISA STIG AIX 7.x v3r1