STIGQter STIGQter: STIG Summary: VMware vRealize Automation 7.x SLES Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 28 Sep 2018:

The SLES for vRealize must automatically lock an account until the locked account is released by an administrator when three unsuccessful logon attempts in 15 minutes occur.

DISA Rule

SV-100431r1_rule

Vulnerability Number

V-89781

Group Title

SRG-OS-000329-GPOS-00128

Rule Version

VRAU-SL-001035

Severity

CAT III

CCI(s)

Weight

10

Fix Recommendation

Edit "/etc/pam.d/common-auth" and add the following line:

auth required pam_tally2.so deny=3 onerr=fail even_deny_root unlock_time=86400 root_unlock_time=300

Edit "/etc/pam.d/common-account" and add the following line:

account required pam_tally2.so

Check Contents

Check the "pam_tally2" configuration:

# more /etc/pam.d/common-auth

Confirm the following line is configured:

auth required pam_tally2.so deny=3 onerr=fail even_deny_root unlock_time=86400 root_unlock_time=300

# more /etc/pam.d/common-account

Confirm the following line is configured:

account required pam_tally2.so

If no such lines are found, this is a finding.

Vulnerability Number

V-89781

Documentable

False

Rule Version

VRAU-SL-001035

Severity Override Guidance

Check the "pam_tally2" configuration:

# more /etc/pam.d/common-auth

Confirm the following line is configured:

auth required pam_tally2.so deny=3 onerr=fail even_deny_root unlock_time=86400 root_unlock_time=300

# more /etc/pam.d/common-account

Confirm the following line is configured:

account required pam_tally2.so

If no such lines are found, this is a finding.

Check Content Reference

M

Target Key

3459

Comments