20.46 Ensure 'Passwords Expire' (STIG only)

Information

This setting ensures that member servers, stand-alone systems and non-domain-joined system have a password expiration date.

The longer a password exists the higher the likelihood that it will be compromised by a brute force attack, by an attacker gaining general knowledge about the user, or by the user sharing the password. Configuring the Maximum password age setting to 0 so that users are never required to change their passwords is a major security risk because that allows a compromised password to be used by the malicious user for as long as the valid user has authorized access.

Solution

Uncheck 'Password never expires' for all enabled user accounts in Active Directory Users and Computers for domain accounts and Users in Computer Management for member servers and standalone or nondomain-joined systems.

Document any exceptions with the information system security officer (ISSO).

Impact:

If the Maximum password age setting is too low, users are required to change their passwords very often. Such a configuration can reduce security in the organization, because users might write their passwords in an insecure location or lose them. If the value for this policy setting is too high, the level of security within an organization is reduced because it allows potential attackers more time in which to discover user passwords or to use compromised accounts.

See Also

https://workbench.cisecurity.org/benchmarks/20002

Item Details

Category: IDENTIFICATION AND AUTHENTICATION

References: 800-53|IA-5(1), CSCv7|16.10

Plugin: Windows

Control ID: 3ec0819933ed49eca14a465acb07e106e09501470bbc02827229bdffd725ea35