STIGQter STIGQter: STIG Summary: Red Hat Enterprise Linux 7 Security Technical Implementation Guide Version: 3 Release: 3 Benchmark Date: 23 Apr 2021:

The Red Hat Enterprise Linux operating system must be configured so that passwords are restricted to a 24 hours/1 day minimum lifetime.

DISA Rule

SV-204419r603261_rule

Vulnerability Number

V-204419

Group Title

SRG-OS-000075-GPOS-00043

Rule Version

RHEL-07-010240

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure non-compliant accounts to enforce a 24 hours/1 day minimum password lifetime:

# chage -m 1 [user]

Check Contents

Check whether the minimum time period between password changes for each user account is one day or greater.

# awk -F: '$4 < 1 {print $1 " " $4}' /etc/shadow

If any results are returned that are not associated with a system account, this is a finding.

Vulnerability Number

V-204419

Documentable

False

Rule Version

RHEL-07-010240

Severity Override Guidance

Check whether the minimum time period between password changes for each user account is one day or greater.

# awk -F: '$4 < 1 {print $1 " " $4}' /etc/shadow

If any results are returned that are not associated with a system account, this is a finding.

Check Content Reference

M

Target Key

2899

Comments