1.3.10 Ensure 'Block Username Inclusion' is enabled

Information

This checks all new passwords to ensure that they block username inclusion (in either forward or reverse order.)
Rationale:
This is one of several settings that, when taken together, ensure that passwords are sufficiently complex as to thwart brute force and dictionary attacks.

Solution

Navigate to Device > Setup > Management > Minimum Password Complexity
Set Block Username Inclusion (Including reversed) to checked
or
Execute the following CLI command:
username@hostname#set mgt-config password-complexity
+ block-repeated-characters Block repeated characters count
+ block-username-inclusion Block inclusion of username and it's reverse
+ enabled Enable minimal password complexity enforcement
+ minimum-length Minimum password length
+ minimum-lowercase-letters Minimum lowercase letters in the password
+ minimum-numeric-letters Minimum numeric(0-9) letters in the password
+ minimum-special-characters Minimum special characters(non-alphanumeric) in the password
+ minimum-uppercase-letters Minimum uppercase letters in the password
+ new-password-differs-by-characters New Password must differ by the count chars
+ password-change-on-first-login Password must change on first time login
+ password-change-period-block Password change block period
+ password-history-count Save password history for password changes
> password-change password-change
<Enter> Finish input
# commit

Default Value:
Not enabled.

See Also

https://workbench.cisecurity.org/files/1780

Item Details

Category: IDENTIFICATION AND AUTHENTICATION

References: 800-53|IA-5(1)(a), CSCv6|5.3

Plugin: Palo_Alto

Control ID: f5ee0244604c434feb92c5e5a027ab680e353939b8920429185aac0f424ee518