STIGQter STIGQter: STIG Summary: Canonical Ubuntu 20.04 LTS Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 10 Mar 2021:

The Ubuntu operating system must enforce 24 hours/1 day as the minimum password lifetime. Passwords for new users must have a 24 hours/1 day minimum password lifetime restriction.

DISA Rule

SV-238202r653781_rule

Vulnerability Number

V-238202

Group Title

SRG-OS-000075-GPOS-00043

Rule Version

UBTU-20-010007

Severity

CAT III

CCI(s)

Weight

10

Fix Recommendation

Configure the Ubuntu operating system to enforce a 24 hours/1 day minimum password lifetime.

Add or modify the following line in the "/etc/login.defs" file:

PASS_MIN_DAYS 1

Check Contents

Verify the Ubuntu operating system enforces a 24 hours/1 day minimum password lifetime for new user accounts by running the following command:

$ grep -i ^pass_min_days /etc/login.defs

PASS_MIN_DAYS 1

If the "PASS_MIN_DAYS" parameter value is less than "1" or is commented out, this is a finding.

Vulnerability Number

V-238202

Documentable

False

Rule Version

UBTU-20-010007

Severity Override Guidance

Verify the Ubuntu operating system enforces a 24 hours/1 day minimum password lifetime for new user accounts by running the following command:

$ grep -i ^pass_min_days /etc/login.defs

PASS_MIN_DAYS 1

If the "PASS_MIN_DAYS" parameter value is less than "1" or is commented out, this is a finding.

Check Content Reference

M

Target Key

5318

Comments