STIGQter STIGQter: STIG Summary: Red Hat Enterprise Linux 8 Security Technical Implementation Guide Version: 1 Release: 2 Benchmark Date: 23 Apr 2021:

RHEL 8 passwords must have a 24 hours/1 day minimum password lifetime restriction in /etc/shadow.

DISA Rule

SV-230364r627750_rule

Vulnerability Number

V-230364

Group Title

SRG-OS-000075-GPOS-00043

Rule Version

RHEL-08-020180

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure non-compliant accounts to enforce a 24 hours/1 day minimum password lifetime:

$ sudo chage -m 1 [user]

Check Contents

Check whether the minimum time period between password changes for each user account is one day or greater.

$ sudo awk -F: '$4 < 1 {print $1 " " $4}' /etc/shadow

If any results are returned that are not associated with a system account, this is a finding.

Vulnerability Number

V-230364

Documentable

False

Rule Version

RHEL-08-020180

Severity Override Guidance

Check whether the minimum time period between password changes for each user account is one day or greater.

$ sudo awk -F: '$4 < 1 {print $1 " " $4}' /etc/shadow

If any results are returned that are not associated with a system account, this is a finding.

Check Content Reference

M

Target Key

2921

Comments