Skip to content

RHEL 9 must maintain an account lock until the locked account is released by an administrator.

An XCCDF Rule

Description

By limiting the number of failed logon attempts the risk of unauthorized system access via user password guessing, otherwise known as brute-forcing, is reduced. Limits are imposed by locking the account. Satisfies: SRG-OS-000329-GPOS-00128, SRG-OS-000021-GPOS-00005

ID
SV-258057r1045146_rule
Version
RHEL-09-411090
Severity
Medium
References
Updated

Remediation Templates

A Manual Procedure

Configure RHEL 9 to lock an account until released by an administrator after three unsuccessful logon attempts with the command:
 
$ sudo authselect enable-feature with-faillock  

Edit the "/etc/security/faillock.conf" file as follows:

unlock_time = 0