STIGQter STIGQter: STIG Summary: Application Security and Development Security Technical Implementation Guide Version: 5 Release: 1 Benchmark Date: 23 Oct 2020:

The application must prohibit password reuse for a minimum of five generations.

DISA Rule

SV-222546r508029_rule

Vulnerability Number

V-222546

Group Title

SRG-APP-000165

Rule Version

APSC-DV-001780

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure the application to prohibit password reuse for up to 5 passwords.

Check Contents

Review the application documentation and interview the application administrator to identify if the application uses passwords for user authentication.

If the application does not use passwords, the requirement is not applicable.

Access the application management interface and view the user password settings page.

Review user password settings and validate the application is configured to prohibit password reuse for a minimum of 5 password generations.

If the application does not prevent users from reusing their previous 5 passwords, or if the application does not have the ability to control this setting, this is a finding.

Vulnerability Number

V-222546

Documentable

False

Rule Version

APSC-DV-001780

Severity Override Guidance

Review the application documentation and interview the application administrator to identify if the application uses passwords for user authentication.

If the application does not use passwords, the requirement is not applicable.

Access the application management interface and view the user password settings page.

Review user password settings and validate the application is configured to prohibit password reuse for a minimum of 5 password generations.

If the application does not prevent users from reusing their previous 5 passwords, or if the application does not have the ability to control this setting, this is a finding.

Check Content Reference

M

Target Key

4093

Comments