5.3.3.1.3 Ensure password failed attempts lockout includes root account
Audit#
Run the following command to verify that even_deny_root and/or root_unlock_time is enabled:
Example output:
Run the following command to verify that - IF - root_unlock_time is set, it is set to 60 (One minute) or more:
Nothing should be returnedRun the following command to check the pam_faillock.so module for the root_unlock_time argument. Verify -IF- root_unlock_time is set, it is set to 60 (One minute) or more:
# grep -Pi -- '^\h*auth\h+([^#\n\r]+\h+)pam_faillock\.so\h+([^#\n\r]+\h+)?root_unlock_time\h*=\h*([1-9]|[1-5][0-9])\b' /etc/pam.d/common-auth
Remediation#
Edit /etc/security/faillock.conf: - Remove or update any line containing root_unlock_time, - OR - set it to a value of 60 or more - Update or add the following line:
Run the following command:
# grep -Pl -- '\bpam_faillock\.so\h+([^#\n\r]+\h+)?(root_unlock_time=([0-9]|[1-5][0-9]))' /usr/share/pam-configs/*
Default Value: disabled