STIGQter STIGQter: STIG Summary: Red Hat Enterprise Linux 8 Security Technical Implementation Guide Version: 1 Release: 2 Benchmark Date: 23 Apr 2021:

RHEL 8 user account passwords must be configured so that existing passwords are restricted to a 60-day maximum lifetime.

DISA Rule

SV-230367r627750_rule

Vulnerability Number

V-230367

Group Title

SRG-OS-000076-GPOS-00044

Rule Version

RHEL-08-020210

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure non-compliant accounts to enforce a 60-day maximum password lifetime restriction.

$ sudo chage -M 60 [user]

Check Contents

Check whether the maximum time period for existing passwords is restricted to 60 days with the following commands:

$ sudo awk -F: '$5 > 60 {print $1 " " $5}' /etc/shadow

$ sudo awk -F: '$5 <= 0 {print $1 " " $5}' /etc/shadow

If any results are returned that are not associated with a system account, this is a finding.

Vulnerability Number

V-230367

Documentable

False

Rule Version

RHEL-08-020210

Severity Override Guidance

Check whether the maximum time period for existing passwords is restricted to 60 days with the following commands:

$ sudo awk -F: '$5 > 60 {print $1 " " $5}' /etc/shadow

$ sudo awk -F: '$5 <= 0 {print $1 " " $5}' /etc/shadow

If any results are returned that are not associated with a system account, this is a finding.

Check Content Reference

M

Target Key

2921

Comments