STIGQter STIGQter: STIG Summary: Central Log Server Security Requirements Guide Version: 1 Release: 4 Benchmark Date: 24 Jul 2020:

The Central Log Server must enforce the limit of three consecutive invalid logon attempts by a user during a 15 minute time period.

DISA Rule

SV-109137r1_rule

Vulnerability Number

V-100033

Group Title

SRG-APP-000065-AU-000240

Rule Version

SRG-APP-000065-AU-000240

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure the Central Log Server to lock out the account after 3 consecutive invalid attempts during a 15 minute period.

Check Contents

Examine the configuration.

Verify that the Central Log Server is configured to lock out the account after 3 consecutive invalid attempts during a 15 minute period.

If the Central Log Server is not configured to lock out the account after 3 consecutive invalid attempts in 15 minutes, this is a finding.

Vulnerability Number

V-100033

Documentable

False

Rule Version

SRG-APP-000065-AU-000240

Severity Override Guidance

Examine the configuration.

Verify that the Central Log Server is configured to lock out the account after 3 consecutive invalid attempts during a 15 minute period.

If the Central Log Server is not configured to lock out the account after 3 consecutive invalid attempts in 15 minutes, this is a finding.

Check Content Reference

M

Target Key

3395

Comments