5.4.1.1 Ensure password expiration is 365 days or less - users

Information

The window of opportunity for an attacker to leverage compromised credentials or successfully compromise credentials via an online brute force attack is limited by the age of the password. Therefore, reducing the maximum age of a password also reduces an attacker's window of opportunity.

Solution

Set the PASS_MAX_DAYS parameter to 90 in /etc/login.defs: PASS_MAX_DAYS 90
Modify user parameters for all users with a password set to match: # chage --maxdays 90 <user>
Notes:
You can also check this setting in /etc/shadow directly. The 5th field should be 365 or less for all users with a password.
Note: A value of -1 will disable password expiration. Additionally the password expiration must be greater than the minimum days between password changes or users will be unable to change their password.

See Also

https://workbench.cisecurity.org/files/1863

Item Details

Category: IDENTIFICATION AND AUTHENTICATION

References: 800-53|IA-5(1)(d), CSCv6|16

Plugin: Unix

Control ID: ff379f76dc165a349a299a7e04f8b62639a294edb55aef4c061da798ab9fd735