STIGQter STIGQter: STIG Summary: Splunk Enterprise 7.x for Windows Security Technical Implementation Guide Version: 2 Release: 2 Benchmark Date: 23 Apr 2021:

Splunk Enterprise must prohibit password reuse for a minimum of five generations for the account of last resort.

DISA Rule

SV-221635r508660_rule

Vulnerability Number

V-221635

Group Title

SRG-APP-000165-AU-002580

Rule Version

SPLK-CL-000390

Severity

CAT III

CCI(s)

Weight

10

Fix Recommendation

Select Settings >> Access Controls >> Password Policy Management and set History to Enabled and Password history count to 5 or more.

Check Contents

Select Settings >> Access Controls >> Password Policy Management and verify that History is Enabled and Password history count is set to 5 or more.

If not set to 5 or more, this is a finding.

Vulnerability Number

V-221635

Documentable

False

Rule Version

SPLK-CL-000390

Severity Override Guidance

Select Settings >> Access Controls >> Password Policy Management and verify that History is Enabled and Password history count is set to 5 or more.

If not set to 5 or more, this is a finding.

Check Content Reference

M

Target Key

4082

Comments