STIGQter STIGQter: STIG Summary: VMware vRealize Operations Manager 6.x SLES Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 28 Sep 2018:

The SLES for vRealize must enforce password complexity by requiring that at least one upper-case character be used.

DISA Rule

SV-99103r1_rule

Vulnerability Number

V-88453

Group Title

SRG-OS-000069-GPOS-00037

Rule Version

VROM-SL-000340

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

If ucredit was not set at all in "/etc/pam.d/common-password-vmware.local" file then run the following command:

# sed -i '/pam_cracklib.so/ s/$/ ucredit=-1/' /etc/pam.d/common-password-vmware.local

If "ucredit" was set incorrectly, run the following command to set it to "-1":

# sed -i '/pam_cracklib.so/ s/ucredit=../ucredit=-1/' /etc/pam.d/common-password-vmware.local

Check Contents

Check SLES for vRealize enforces password complexity by requiring that at least one upper-case character be used by using the following command:

# grep ucredit /etc/pam.d/common-password-vmware.local

If "ucredit" is not set to "-1" or not at all, this is a finding.

Expected Result:
password requisite pam_cracklib.so dcredit=-1 ucredit=-1 lcredit=-1 ocredit=-1 minlen=14 difok=4 retry=3

Vulnerability Number

V-88453

Documentable

False

Rule Version

VROM-SL-000340

Severity Override Guidance

Check SLES for vRealize enforces password complexity by requiring that at least one upper-case character be used by using the following command:

# grep ucredit /etc/pam.d/common-password-vmware.local

If "ucredit" is not set to "-1" or not at all, this is a finding.

Expected Result:
password requisite pam_cracklib.so dcredit=-1 ucredit=-1 lcredit=-1 ocredit=-1 minlen=14 difok=4 retry=3

Check Content Reference

M

Target Key

3461

Comments