STIGQter STIGQter: STIG Summary: VMware vRealize Automation 7.x SLES Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 28 Sep 2018:

The SLES for vRealize must enforce password complexity by requiring that at least one numeric character be used.

DISA Rule

SV-100219r1_rule

Vulnerability Number

V-89569

Group Title

SRG-OS-000071-GPOS-00039

Rule Version

VRAU-SL-000355

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

If "dcredit" was not set at all in /etc/pam.d/common-password-vmware.local, run the following command:

# sed -i '/pam_cracklib.so/ s/$/ dcredit=-1/' /etc/pam.d/common-password-vmware.local

If "dcredit" was set incorrectly, run the following command:

# sed -i '/pam_cracklib.so/ s/dcredit=../dcredit=-1/' /etc/pam.d/common-password-vmware.local

Check Contents

Check that the SLES for vRealize enforces password complexity by requiring that at least one numeric character be used by running the following command:

# grep dcredit /etc/pam.d/common-password-vmware.local

If "dcredit" is not set to "-1" or is not set at all, this is a finding.

Expected Result:
password requisite pam_cracklib.so dcredit=-1 ucredit=-1 lcredit=-1 ocredit=-1 minlen=14 difok=4 retry=3

Vulnerability Number

V-89569

Documentable

False

Rule Version

VRAU-SL-000355

Severity Override Guidance

Check that the SLES for vRealize enforces password complexity by requiring that at least one numeric character be used by running the following command:

# grep dcredit /etc/pam.d/common-password-vmware.local

If "dcredit" is not set to "-1" or is not set at all, this is a finding.

Expected Result:
password requisite pam_cracklib.so dcredit=-1 ucredit=-1 lcredit=-1 ocredit=-1 minlen=14 difok=4 retry=3

Check Content Reference

M

Target Key

3459

Comments