5.3.3.1.1 Ensure password failed attempts lockout is configured
Audit#
Run the following command to verify that Number of failed logon attempts before the account is locked is no greater than 5 and meets local site policy:
Run the following command to verify that the deny argument has not been set, or 5 or less and meets local site policy:
# grep -Pi -- '^\h*auth\h+(requisite|required|sufficient)\h+pam_faillock\.so\h+([^#\n\r]+\h+)?deny\h*=\h*(0|[6-9]|[1-9][0-9]+)\b' /etc/pam.d/common-auth
Remediation#
Create or edit the following line in /etc/security/faillock.conf setting the deny option to 5 or less:
Run the following command:
Edit any returned files and remove the deny=
Default Value: deny = 3