Skip to content

AIX must prohibit password reuse for a minimum of five generations.

An XCCDF Rule

Description

<VulnDiscussion>Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. If the information system or application allows the user to consecutively reuse their password when that password has exceeded its defined lifetime, the end result is a password that is not changed as per policy requirements.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>

ID
SV-215224r508663_rule
Severity
Medium
References
Updated



Remediation - Manual Procedure

From the command prompt, run the following command to set "histsize=5" for the default stanza in "/etc/security/user":
# chsec -f /etc/security/user -s default -a histsize=5

For each user who has "histsize" value less than "5", set its "histsize" to "5" by running the following command from command prompt:
# chsec -f /etc/security/user -s [user_name] -a histsize=5