STIGQter STIGQter: STIG Summary: DBN-6300 NDM Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 12 Sep 2017:

The DBN-6300 must prohibit password reuse for a minimum of five generations.

DISA Rule

SV-91657r1_rule

Vulnerability Number

V-76961

Group Title

SRG-APP-000165-NDM-000253

Rule Version

DBNW-DM-000056

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Set a password-reuse variable within the DBN-6300 through the CLI.

This value is set with the following registry entry in the CLI:
reg set /sysconfig/auth/01 {"stores": {"local": {"policies": {"passwordReuse": {"check": true,"numberToKeep": 5 }}}}}

Check Contents

To see if the system prohibits password reuse attempt to change the users password deliberately reusing the last passwords used. The user should fail to update their password for the last five passwords that their account has used.

If the user is able to reuse their password before using five different password, this is a finding.

Vulnerability Number

V-76961

Documentable

False

Rule Version

DBNW-DM-000056

Severity Override Guidance

To see if the system prohibits password reuse attempt to change the users password deliberately reusing the last passwords used. The user should fail to update their password for the last five passwords that their account has used.

If the user is able to reuse their password before using five different password, this is a finding.

Check Content Reference

M

Target Key

2947

Comments