Skip to content
ATO Pathways
Log In
Overview
Search
Catalogs
SCAP
OSCAL
Catalogs
Profiles
Documents
References
Knowledge Base
Platform Documentation
Compliance Dictionary
Platform Changelog
About
Catalogs
XCCDF
Guide to the Secure Configuration of Red Hat Enterprise Linux 8
System Settings
Account and Access Control
Protect Accounts by Configuring PAM
Set Lockouts for Failed Password Attempts
Lock Accounts After Failed Password Attempts
Lock Accounts After Failed Password Attempts
An XCCDF Rule
Details
Profiles
Prose
Lock Accounts After Failed Password Attempts
Medium Severity
This rule configures the system to lock out accounts after a number of incorrect login attempts using
pam_faillock.so
. pam_faillock.so module requires multiple entries in pam files. These entries must be carefully defined to work as expected. Ensure that the file
/etc/security/faillock.conf
contains the following entry:
deny = <count>
Where count should be less than or equal to
and greater than 0. In order to avoid errors when manually editing these files, it is recommended to use the appropriate tools, such as
authselect
or
authconfig
, depending on the OS version.