STIGQter STIGQter: STIG Summary: VMware vRealize Automation 7.x SLES Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 28 Sep 2018:

The SLES for vRealize must prohibit password reuse for a minimum of five generations.

DISA Rule

SV-100235r1_rule

Vulnerability Number

V-89585

Group Title

SRG-OS-000077-GPOS-00045

Rule Version

VRAU-SL-000400

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure pam to use password history.

If "remember" was not set at all in /etc/pam.d/common-password-vmware.local, run the following command:

# sed -i '/pam_cracklib.so/ s/$/ remember=5/' /etc/pam.d/common-password-vmware.local

If "remember" was set incorrectly, run the following command to set it to "5":

# sed -i '/pam_cracklib.so/ s/remember=./remember=5/' /etc/pam.d/common-password-vmware.local

Check Contents

Verify that the SLES for vRealize prohibits the reuse of a password for a minimum of five generations by running the following commands:

# grep pam_pwhistory.so /etc/pam.d/common-password-vmware.local

If the "remember" option in /etc/pam.d/common-password-vmware.local is not "5" or greater, this is a finding.

Vulnerability Number

V-89585

Documentable

False

Rule Version

VRAU-SL-000400

Severity Override Guidance

Verify that the SLES for vRealize prohibits the reuse of a password for a minimum of five generations by running the following commands:

# grep pam_pwhistory.so /etc/pam.d/common-password-vmware.local

If the "remember" option in /etc/pam.d/common-password-vmware.local is not "5" or greater, this is a finding.

Check Content Reference

M

Target Key

3459

Comments