Information
The operating system must disable account identifiers (individuals, groups, roles, and devices) if the password expires.
Rationale:
Inactive identifiers pose a risk to systems and applications because attackers may exploit an inactive identifier and potentially obtain undetected access to the system. Owners of inactive accounts will not notice if unauthorized access to their user account has been obtained.
Operating systems need to track periods of inactivity and disable application identifiers after zero days of inactivity.
Solution
Configure the operating system to disable account identifiers (individuals, groups, roles, and devices) after the password expires.
Add the following line to /etc/default/useradd (or modify the line to have the required value):
Example: vim /etc/default/useradd
Add, uncomment or update the following line:
INACTIVE=0
Notes:
The Benchmark recommendation maps to:
Red Hat Enterprise Linux 7 Security Technical Implementation Guide:
Version 2, Release: 3 Benchmark Date: 26 Apr 2019
Vul ID: V-71941
Rule ID: SV-86565r2_rule
STIG ID: RHEL-07-010310
Severity: CAT II