STIGQter STIGQter: STIG Summary: VMware vRealize Operations Manager 6.x SLES Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 28 Sep 2018:

The SLES for vRealize must prohibit password reuse for a minimum of five generations.

DISA Rule

SV-99123r1_rule

Vulnerability Number

V-88473

Group Title

SRG-OS-000077-GPOS-00045

Rule Version

VROM-SL-000395

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure pam to use password history.

If the "remember" option was not set at all in "/etc/pam.d/common-password-vmware.local" file then run the following command:

# sed -i '/pam_cracklib.so/ s/$/ remember=5/' /etc/pam.d/common-password-vmware.local

If "remember" option was set incorrectly, run the following command to set it to "5":

# sed -i '/pam_cracklib.so/ s/remember=./remember=5/' /etc/pam.d/common-password-vmware.local

Check Contents

Verify that SLES for vRealize prohibits the reuse of a password for a minimum of five generations, by running the following commands:

# grep pam_pwhistory.so /etc/pam.d/common-password-vmware.local

If the "remember" option in "/etc/pam.d/common-password-vmware.local" file is not "5" or greater, this is a finding.

Vulnerability Number

V-88473

Documentable

False

Rule Version

VROM-SL-000395

Severity Override Guidance

Verify that SLES for vRealize prohibits the reuse of a password for a minimum of five generations, by running the following commands:

# grep pam_pwhistory.so /etc/pam.d/common-password-vmware.local

If the "remember" option in "/etc/pam.d/common-password-vmware.local" file is not "5" or greater, this is a finding.

Check Content Reference

M

Target Key

3461

Comments