UCF STIG Viewer Logo

SSMC must enforce a delay of at least four seconds between logon prompts following a failed logon attempt.


Overview

Finding ID Version Rule ID IA Controls Severity
V-255240 SSMC-OS-010060 SV-255240r869870_rule Medium
Description
Limiting the number of logon attempts over a certain time interval reduces the chances that an unauthorized user may gain access to an account.
STIG Date
HPE 3PAR SSMC Operating System Security Technical Implementation Guide 2022-10-13

Details

Check Text ( C-58853r869868_chk )
Verify that SSMC enforces a delay of at least four seconds between logon prompts following a failed logon attempt. To do so, perform the following steps.

1. Log on to SSMC appliance as ssmcadmin. Press "X" to escape to general bash shell.

2. Execute the following command:

$ sudo /ssmc/bin/config_security.sh -o config_failedlogin_delay -a status

Failed login delay is enabled

If the command output does not read "Failed login delay is enabled", this is a finding.
Fix Text (F-58797r869869_fix)
Configure SSMC to enforce a delay of at least four seconds between logon prompts following a failed logon attempt. To do so, perform the following steps.

1. Log on to SSMC appliance as ssmcadmin. Press "X" to escape to general bash shell.

2. Execute the following command:

$ sudo /ssmc/bin/config_security.sh -o config_failedlogin_delay -a enable -f