F5BI-DM-000185 - The BIG-IP appliance must be configured to automatically lock the account until the locked account is released by an administrator when three unsuccessful logon attempts in 15 minutes are exceeded.

Information

By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-forcing, is reduced. Limits are imposed by locking the account.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Configure the BIG-IP appliance to use a properly configured remote authentication server to automatically lock the account until the locked account is released by an administrator when three unsuccessful logon attempts in 15 minutes are exceeded.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_F5_BIG-IP_Y24M01_STIG.zip

Item Details

Category: ACCESS CONTROL, CONFIGURATION MANAGEMENT

References: 800-53|AC-7b., 800-53|CM-6b., CAT|II, CCI|CCI-000366, CCI|CCI-002238, Rule-ID|SV-229002r879887_rule, STIG-ID|F5BI-DM-000185, STIG-Legacy|SV-74625, STIG-Legacy|V-60195, Vuln-ID|V-229002

Plugin: F5

Control ID: 87684db5f4e2197b49e5d6b012b9d15090a40de147db90838d10c7c56aa8b489