STIGQter STIGQter: STIG Summary: Canonical Ubuntu 20.04 LTS Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 10 Mar 2021:

The Ubuntu operating system must prohibit password reuse for a minimum of five generations.

DISA Rule

SV-238234r685225_rule

Vulnerability Number

V-238234

Group Title

SRG-OS-000077-GPOS-00045

Rule Version

UBTU-20-010070

Severity

CAT III

CCI(s)

Weight

10

Fix Recommendation

Configure the Ubuntu operating system to prevent passwords from being reused for a minimum of five generations.

Add or modify the "remember" parameter value to the following line in "/etc/pam.d/common-password" file:

password [success=1 default=ignore] pam_unix.so obsecure sha512 shadow remember=5 rounds=5000

Check Contents

Verify the Ubuntu operating system prevents passwords from being reused for a minimum of five generations by running the following command:

$ grep -i remember /etc/pam.d/common-password

password [success=1 default=ignore] pam_unix.so obsecure sha512 shadow remember=5 rounds=5000

If the "remember" parameter value is not greater than or equal to "5", is commented out, or is not set at all, this is a finding.

Vulnerability Number

V-238234

Documentable

False

Rule Version

UBTU-20-010070

Severity Override Guidance

Verify the Ubuntu operating system prevents passwords from being reused for a minimum of five generations by running the following command:

$ grep -i remember /etc/pam.d/common-password

password [success=1 default=ignore] pam_unix.so obsecure sha512 shadow remember=5 rounds=5000

If the "remember" parameter value is not greater than or equal to "5", is commented out, or is not set at all, this is a finding.

Check Content Reference

M

Target Key

5318

Comments