The password for the krbtgt account on a domain must be reset at least every 180 days.
The krbtgt account acts as a service account for the Kerberos Key Distribution Center (KDC) service. The account and password are created when a domain is created and the password is typically not changed. If the krbtgt account is compromised, attackers can create valid Kerberos Ticket Granting Tickets (TGT).
The password must be changed twice to effectively remove the password history. Changing once, waiting for replication to complete and the amount of time equal to or greater than the maximum Kerberos ticket lifetime, and changing again reduces the risk of issues.
This requirement is applicable to domain controllers; it is NA for other systems.
Open "Windows PowerShell".
Enter "Get-ADUser krbtgt -Property PasswordLastSet".
If the "PasswordLastSet" date is more than 180 days old, this is a finding.
Fix Text (F-99457r1_fix)
Reset the password for the krbtgt account a least every 180 days. The password must be changed twice to effectively remove the password history. Changing once, waiting for replication to complete and changing again reduces the risk of issues. Changing twice in rapid succession forces clients to re-authenticate (including application services) but is desired if a compromise is suspected.
PowerShell scripts are available to accomplish this such as at the following link: