5.3.2.1.1 Ensure password failed attempts lockout is configured
Information
The deny=<n> option will deny access if the number of consecutive authentication failures for this user during the recent interval exceeds . Locking out user IDs after n unsuccessful consecutive login attempts mitigates brute force password attacks against your systems.
Solution
Create or edit the following line in /etc/security/faillock.conf setting the deny option to 5 or less: deny = 5