STIGQter STIGQter: STIG Summary: VMware vRealize Operations Manager 6.x SLES Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 28 Sep 2018:

The SLES for vRealize must enforce password complexity by requiring that at least one numeric character be used.

DISA Rule

SV-99109r1_rule

Vulnerability Number

V-88459

Group Title

SRG-OS-000071-GPOS-00039

Rule Version

VROM-SL-000355

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

If dcredit was not set at all in "/etc/pam.d/common-password-vmware.local" then run the following command:

# sed -i '/pam_cracklib.so/ s/$/ dcredit=-1/' /etc/pam.d/common-password-vmware.local

If "dcredit" was set incorrectly, run the following command to set it to "-1":

# sed -i '/pam_cracklib.so/ s/dcredit=../dcredit=-1/' /etc/pam.d/common-password-vmware.local

Check Contents

Check that SLES for vRealize enforces password complexity by requiring that at least one numeric character be used by running the following command:

# grep dcredit /etc/pam.d/common-password-vmware.local

If "dcredit" is not set to "-1" or not at all, this is a finding.

Expected Result:
password requisite pam_cracklib.so dcredit=-1 ucredit=-1 lcredit=-1 ocredit=-1 minlen=14 difok=4 retry=3

Vulnerability Number

V-88459

Documentable

False

Rule Version

VROM-SL-000355

Severity Override Guidance

Check that SLES for vRealize enforces password complexity by requiring that at least one numeric character be used by running the following command:

# grep dcredit /etc/pam.d/common-password-vmware.local

If "dcredit" is not set to "-1" or not at all, this is a finding.

Expected Result:
password requisite pam_cracklib.so dcredit=-1 ucredit=-1 lcredit=-1 ocredit=-1 minlen=14 difok=4 retry=3

Check Content Reference

M

Target Key

3461

Comments