Amazon Linux 2023 must automatically lock an account when three unsuccessful logon attempts occur.

Overview

Finding IDVersionRule IDIA ControlsSeverity
V-274154AZLX-23-002455SV-274154r1120450_ruleCCI-002238medium
Description
By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-forcing, is reduced. Limits are imposed by locking the account.
STIGDate
Amazon Linux 2023 Security Technical Implementation Guide2026-02-27

Details

Check Text (C-274154r1120450_chk)

Verify Amazon Linux 2023 is configured to lock an account after three unsuccessful logon attempts with the command: $ grep 'deny =' /etc/security/faillock.conf deny = 3 If the "deny" option is not set to "3" or less (but not "0"), is missing or commented out, this is a finding.

Fix Text (F-78150r1120449_fix)

Configure Amazon Linux 2023 to lock an account when three unsuccessful logon attempts occur. Add/modify the "/etc/security/faillock.conf" file to match the following line: deny = 3