AIX must prohibit password reuse for a minimum of five generations.
An XCCDF Rule
Description
<VulnDiscussion>Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. If the information system or application allows the user to consecutively reuse their password when that password has exceeded its defined lifetime, the end result is a password that is not changed as per policy requirements.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>
- ID
- SV-215224r508663_rule
- Severity
- Medium
- References
- Updated
Remediation - Manual Procedure
From the command prompt, run the following command to set "histsize=5" for the default stanza in "/etc/security/user":
# chsec -f /etc/security/user -s default -a histsize=5
For each user who has "histsize" value less than "5", set its "histsize" to "5" by running the following command from command prompt:
# chsec -f /etc/security/user -s [user_name] -a histsize=5