|Finding ID||Version||Rule ID||IA Controls||Severity|
|The more attempts an adversary has to guess a password, the more likely the adversary will enter the correct password and gain access to resources on the device. Setting a limit on the number of attempts mitigates this risk. Setting the limit at 10 or fewer gives authorized users the ability to make a few mistakes when entering the password but still provides adequate protection against dictionary or brute force attacks on the password. SFR ID: FMT_SMF_EXT.1.1 #2c, FIA_AFL_EXT.1.5|
|Samsung Android OS 8 with Knox 3.x COBO Use Case Security Technical Implementation Guide||2019-10-01|
|Check Text ( C-79877r1_chk )|
| Review Samsung Android 8 with Knox configuration settings to determine if the mobile device has the maximum number of consecutive failed authentication attempts set to "10" or fewer. |
This validation procedure is performed on the MDM Administration Console only.
On the MDM console, do the following:
1. Ask the MDM Administrator to display the "Maximum Failed Attempts for wipe" field in the "Android Password Restrictions" rule for the device unlock password.
2. Verify the value of the setting is set to "10" or fewer.
If the MDM console "Maximum Failed Attempts for wipe" is not set to "10" or fewer, this is a finding.
|Fix Text (F-87011r1_fix)|
| Configure Samsung Android 8 with Knox to allow only 10 or fewer consecutive failed authentication attempts. |
On the MDM console, set the "Maximum Failed Attempts for wipe" to "10" or fewer in the "Android Password Restrictions" rule for the device unlock password.