STIGQter STIGQter: STIG Summary: F5 BIG-IP Device Management 11.x Security Technical Implementation Guide Version: 2 Release: 1 Benchmark Date: 23 Oct 2020:

The BIG-IP appliance must be configured to enforce a minimum 15-character password length.

DISA Rule

SV-217398r557520_rule

Vulnerability Number

V-217398

Group Title

SRG-APP-000164-NDM-000252

Rule Version

F5BI-DM-000107

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure the BIG-IP appliance to use a properly configured authentication server to enforce a minimum 15-character password length.

Check Contents

Verify the BIG-IP appliance is configured to use a properly configured authentication server that enforces a minimum 15-character password length.

Navigate to the BIG-IP System manager >> System >> Users >> Authentication.

Verify "Authentication: User Directory" is configured for an approved remote authentication server that enforces a minimum of 15-character password length.

If the BIG-IP appliance is not configured to use a properly configured authentication server to enforce a minimum 15-character password length, this is a finding.

Vulnerability Number

V-217398

Documentable

False

Rule Version

F5BI-DM-000107

Severity Override Guidance

Verify the BIG-IP appliance is configured to use a properly configured authentication server that enforces a minimum 15-character password length.

Navigate to the BIG-IP System manager >> System >> Users >> Authentication.

Verify "Authentication: User Directory" is configured for an approved remote authentication server that enforces a minimum of 15-character password length.

If the BIG-IP appliance is not configured to use a properly configured authentication server to enforce a minimum 15-character password length, this is a finding.

Check Content Reference

M

Target Key

4036

Comments