800-53|AC-7b.

Title

UNSUCCESSFUL LOGON ATTEMPTS

Description

Automatically [Selection: locks the account/node for an [Assignment: organization-defined time period]; locks the account/node until released by an administrator; delays next logon prompt according to [Assignment: organization-defined delay algorithm]] when the maximum number of unsuccessful attempts is exceeded.

Reference Item Details

Category: ACCESS CONTROL

Family: ACCESS CONTROL

Baseline Impact: LOW,MODERATE,HIGH

Audit Items

View all Reference Audit Items

NamePluginAudit Name
1.1.3.6.1 Set 'Interactive logon: Machine account lockout threshold' to 10 or fewer invalid logon attemptsWindowsCIS Windows 8 L1 v1.0.0
1.2.1 - /etc/security/login.cfg - 'logininterval <= 300'UnixCIS AIX 5.3/6.1 L1 v1.1.0
1.2.2 - /etc/security/login.cfg - 'logindisable <= 10'UnixCIS AIX 5.3/6.1 L1 v1.1.0
1.2.5 - /etc/security/login.cfg - 'logindelay >= 10'UnixCIS AIX 5.3/6.1 L1 v1.1.0
1.4.2 Ensure 'Failed Attempts' and 'Lockout Time' for Authentication Profile are properly configured - Lockout TimePalo_AltoCIS Palo Alto Firewall 6 Benchmark L1 v1.0.0
1.4.2 Ensure 'Failed Attempts' and 'Lockout Time' for Authentication Profile are properly configured - Lockout TimePalo_AltoCIS Palo Alto Firewall 7 Benchmark L1 v1.0.0
3.4.2 /etc/security/login.cfg - logindelay - logindelayUnixCIS IBM AIX 7.1 L1 v2.1.0
4.003 - Time before bad-logon counter is reset does not meet minimum requirements.WindowsDISA Windows Vista STIG v6r41
4.004 - Lockout duration does not meet minimum requirements.WindowsDISA Windows Vista STIG v6r41
4.6.2 /etc/security/login.cfg - logindelayUnixCIS IBM AIX 7.2 L1 v1.0.0
5.2 Use LockOut RealmsUnixCIS Apache Tomcat 7 L2 v1.1.0
5.2 Use LockOut RealmsUnixCIS Apache Tomcat 7 L2 v1.1.0 Middleware
5.4.1.10 Ensure delay between logon prompts on failureUnixCIS Amazon Linux 2 STIG v1.0.0 L3
5.4.12 Ensure accounts lock for a minimum of 15 minutes after three unsuccessful logon attempts within a 15-minute timeframe - password-auth denyUnixCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
5.4.12 Ensure accounts lock for a minimum of 15 minutes after three unsuccessful logon attempts within a 15-minute timeframe - password-auth even_deny_rootUnixCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
5.4.12 Ensure accounts lock for a minimum of 15 minutes after three unsuccessful logon attempts within a 15-minute timeframe - password-auth fail_intervalUnixCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
5.4.12 Ensure accounts lock for a minimum of 15 minutes after three unsuccessful logon attempts within a 15-minute timeframe - password-auth unlock_timeUnixCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
5.4.12 Ensure accounts lock for a minimum of 15 minutes after three unsuccessful logon attempts within a 15-minute timeframe - system-auth denyUnixCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
5.4.12 Ensure accounts lock for a minimum of 15 minutes after three unsuccessful logon attempts within a 15-minute timeframe - system-auth even_deny_rootUnixCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
5.4.12 Ensure accounts lock for a minimum of 15 minutes after three unsuccessful logon attempts within a 15-minute timeframe - system-auth fail_intervalUnixCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
5.4.12 Ensure accounts lock for a minimum of 15 minutes after three unsuccessful logon attempts within a 15-minute timeframe - system-auth unlock_timeUnixCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
5.4.13 Ensure lockout for unsuccessful root logon attemptsUnixCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
5.4.13 Ensure lockout for unsuccessful root logon attempts - password-auth defaultUnixCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
5.4.13 Ensure lockout for unsuccessful root logon attempts - system-auth defaultUnixCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
5.4.13 Ensure lockout for unsuccessful root logon attempts - system-auth requiredUnixCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
AIX7-00-001003 - AIX must enforce the limit of three consecutive invalid login attempts by a user before the user account is locked and released by an administrator.UnixDISA STIG AIX 7.x v2r9
AOSX-13-001324 - The macOS system must enforce an account lockout time period of 15 minutes in which a user makes three consecutive invalid logon attempts.UnixDISA STIG Apple Mac OSX 10.13 v2r5
AOSX-13-001327 - The macOS system must enforce the limit of three consecutive invalid logon attempts by a user before the user account is locked.UnixDISA STIG Apple Mac OSX 10.13 v2r5
AOSX-14-000021 - The macOS system must enforce an account lockout time period of 15 minutes in which a user makes three consecutive invalid logon attempts.UnixDISA STIG Apple Mac OSX 10.14 v2r6
AOSX-14-000022 - The macOS system must enforce the limit of three consecutive invalid logon attempts by a user before the user account is locked.UnixDISA STIG Apple Mac OSX 10.14 v2r6
AOSX-15-000021 - The macOS system must enforce an account lockout time period of 15 minutes in which a user makes three consecutive invalid logon attempts.UnixDISA STIG Apple Mac OSX 10.15 v1r10
AOSX-15-000022 - The macOS system must enforce the limit of three consecutive invalid logon attempts by a user before the user account is locked.UnixDISA STIG Apple Mac OSX 10.15 v1r10
APPL-11-000022 - The macOS system must enforce the limit of three consecutive invalid logon attempts by a user before the user account is locked - maxFailedAttemptsUnixDISA STIG Apple macOS 11 v1r5
APPL-11-000022 - The macOS system must enforce the limit of three consecutive invalid logon attempts by a user before the user account is locked - maxFailedAttemptsUnixDISA STIG Apple macOS 11 v1r8
APPL-11-000022 - The macOS system must enforce the limit of three consecutive invalid logon attempts by a user before the user account is locked - minutesUntilFailedLoginResetUnixDISA STIG Apple macOS 11 v1r5
APPL-11-000022 - The macOS system must enforce the limit of three consecutive invalid logon attempts by a user before the user account is locked - minutesUntilFailedLoginResetUnixDISA STIG Apple macOS 11 v1r8
APPL-12-000022 - The macOS system must enforce the limit of three consecutive invalid logon attempts by a user before the user account is locked.UnixDISA STIG Apple macOS 12 v1r8
APPL-13-000022 - The macOS system must enforce the limit of three consecutive invalid logon attempts by a user before the user account is locked.UnixDISA STIG Apple macOS 13 v1r3
Big Sur - Limit Consecutive Failed Login Attempts to ThreeUnixNIST macOS Big Sur v1.4.0 - CNSSI 1253
Big Sur - Limit Consecutive Failed Login Attempts to ThreeUnixNIST macOS Big Sur v1.4.0 - 800-53r4 High
Big Sur - Limit Consecutive Failed Login Attempts to ThreeUnixNIST macOS Big Sur v1.4.0 - 800-53r4 Low
Big Sur - Limit Consecutive Failed Login Attempts to ThreeUnixNIST macOS Big Sur v1.4.0 - 800-53r4 Moderate
Big Sur - Limit Consecutive Failed Login Attempts to ThreeUnixNIST macOS Big Sur v1.4.0 - 800-53r5 Moderate
Big Sur - Limit Consecutive Failed Login Attempts to ThreeUnixNIST macOS Big Sur v1.4.0 - 800-171
Big Sur - Limit Consecutive Failed Login Attempts to ThreeUnixNIST macOS Big Sur v1.4.0 - All Profiles
Big Sur - Limit Consecutive Failed Login Attempts to ThreeUnixNIST macOS Big Sur v1.4.0 - 800-53r5 High
Big Sur - Limit Consecutive Failed Login Attempts to ThreeUnixNIST macOS Big Sur v1.4.0 - 800-53r5 Low
Big Sur - Set Account Lockout Time to 15 MinutesUnixNIST macOS Big Sur v1.4.0 - 800-53r4 High
Big Sur - Set Account Lockout Time to 15 MinutesUnixNIST macOS Big Sur v1.4.0 - 800-53r5 High
Big Sur - Set Account Lockout Time to 15 MinutesUnixNIST macOS Big Sur v1.4.0 - All Profiles