ComplianceAsCode / content

Security automation content in SCAP, Bash, Ansible, and other formats
https://complianceascode.readthedocs.io/en/latest/
Other
2.17k stars 685 forks source link

needs mapping/rule: SRG-OS-000076-GPOS-00044, SV-86555r1_rule, RHEL-07-010260 (60 day between pw change) #1825

Closed shawndwells closed 7 years ago

shawndwells commented 7 years ago

`` Group id="V-71931">SRG-OS-000076-GPOS-00044<GroupDescription></GroupDescription>RHEL-07-010260Existing passwords must be restricted to a 60-day maximum lifetime.<VulnDiscussion>Any password, no matter how complex, can eventually be cracked. Therefore, passwords need to be changed periodically. If the operating system does not limit the lifetime of passwords and force users to change their passwords, there is the risk that the operating system passwords could be compromised.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target Red Hat 7</dc:title>DISA</dc:publisher>DPMS Target</dc:type>Red Hat 7</dc:subject>2777</dc:identifier>CCI-000199Configure non-compliant accounts to enforce a 60-day maximum password lifetime restriction.^M ^M

chage -M 60 [user]Check whether the maximum time period for existing passwords is restricted to 60 days.^M

^M

awk -F: '$5 > 60 {print $1}' /etc/shadow^M

^M If any results are returned that are not associated with a system account, this is a finding. ``

shawndwells commented 7 years ago

Dupe of https://github.com/OpenSCAP/scap-security-guide/issues/2040, closing this one