STIGQter STIGQter: STIG Summary: Palo Alto Networks NDM Security Technical Implementation Guide Version: 1 Release: 4 Benchmark Date: 24 Jan 2020:

The Palo Alto Networks security platform must automatically lock the account until the locked account is released by an administrator when three unsuccessful logon attempts in 15 minutes are exceeded.

DISA Rule

SV-77237r1_rule

Vulnerability Number

V-62747

Group Title

SRG-APP-000345-NDM-000290

Rule Version

PANW-NM-000092

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

This should not be configured in Device >> Setup >> Management >> Authentication Settings; instead, an authentication profile should be configured with lockout settings of three failed attempts and a lockout time of zero minutes.
Go to Device >> Authentication Profile
Select the configured authentication profile, or select "Add" (in the bottom-left corner of the pane) to create a new one.
In the "Authentication Profile" field, enter the name of the authentication profile that will be used to control each person's authentication process.
The "Lockout Time (min)" field is the lockout duration; this must be set to "0". This will keep the lockout in effect until it is manually unlocked.
In the "Failed Attempts" field, enter "3".
Select "OK".

Apply the authentication profile to the Administrator accounts.
Go to Device >> Administrators
Select each configured account, or select "Add" (in the bottom-left corner of the pane) to create a new one.
In the "Authentication Profile" field, enter the configured authentication profile.
Select "OK".

This authentication profile should not be applied to the emergency administration account since it has special requirements.
Commit changes by selecting "Commit" in the upper-right corner of the screen.
Select "OK" when the confirmation dialog appears.

Check Contents

Go to Device >> Administrators.
If there is no authentication profile configured for each account (aside from the emergency administration account), this is a finding.

Note which authentication profile is used for each account.
Go to Device >> Authentication Profile.
Check the authentication profile used for each account (noted in the previous step).
If the Lockout Time is not set to "0" (zero), this is a finding.

Vulnerability Number

V-62747

Documentable

False

Rule Version

PANW-NM-000092

Severity Override Guidance

Go to Device >> Administrators.
If there is no authentication profile configured for each account (aside from the emergency administration account), this is a finding.

Note which authentication profile is used for each account.
Go to Device >> Authentication Profile.
Check the authentication profile used for each account (noted in the previous step).
If the Lockout Time is not set to "0" (zero), this is a finding.

Check Content Reference

M

Target Key

2811

Comments