UCF STIG Viewer Logo

Samsung Android must be configured to not allow more than 10 consecutive failed authentication attempts.


Overview

Finding ID Version Rule ID IA Controls Severity
V-93879 KNOX-09-000435 SV-103965r1_rule Low
Description
The more attempts an adversary has to guess a password, the more likely the adversary will enter the correct password and gain access to resources on the device. Setting a limit on the number of attempts mitigates this risk. Setting the limit at 10 or less gives authorized users the ability to make a few mistakes when entering the password but still provides adequate protection against dictionary or brute force attacks on the password. SFR ID: FMT_SMF_EXT.1.1 #2c, FIA_AFL_EXT.1.5
STIG Date
Samsung Android OS 9 with Knox 3.x COPE Use Case KPE(Legacy) Deployment Security Technical Implementation Guide 2019-10-01

Details

Check Text ( C-93197r1_chk )
Review device configuration settings to confirm that the maximum number of consecutive failed authentication attempts is set to "10" or fewer.

This procedure is performed on the MDM Administration console only.

On the MDM console, for the device, in the "Android lock screen restrictions" group, verify that the "max password failures for local wipe" is "10" or fewer.

If on the MDM console "max password failures for local wipe" is more than "10", this is a finding.
Fix Text (F-100125r1_fix)
Configure Samsung Android to allow only 10 consecutive failed authentication attempts before device wipe.

On the MDM console, for the Device, in the "Android lock screen restrictions" group, set the "max password failures for local wipe" to "10".