O112-C2-014500 - The DBMS must support organizational requirements to enforce the number of characters that get changed when passwords are changed.

Information

Passwords need to be changed at specific policy-based intervals.

If the information system or application allows the user to consecutively reuse extensive portions of their password when they change their password, the end result is a password that has not had enough elements changed to meet the policy requirements.

Changing passwords frequently can thwart password-guessing attempts or re-establish protection of a compromised DBMS account. Minor changes to passwords may not accomplish this since password guessing may be able to continue to build on previous guesses, or the new password may be easily guessed using the old password.

Note that user authentication and account management must be done via an enterprise-wide mechanism whenever possible. Examples of enterprise-level authentication/access mechanisms include, but are not limited to, Active Directory and LDAP This requirement applies to cases where it is necessary to have accounts directly managed by Oracle.

Solution

If any user accounts are managed by Oracle: Develop, test and implement a password verification function that enforces DoD requirements.

(Oracle supplies a sample function called verify_function_11G, in the script file
<oracle_home>/RDBMS/ADMIN/utlpwdmg.sql. This can be used as the starting point for a customized function.)

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Oracle_Database_11-2g_V2R5_STIG.zip

Item Details

Category: IDENTIFICATION AND AUTHENTICATION

References: 800-53|IA-5(1)(a), CAT|II, CCI|CCI-000192, Rule-ID|SV-238467r981946_rule, STIG-ID|O112-C2-014500, STIG-Legacy|SV-66499, STIG-Legacy|V-52283, Vuln-ID|V-238467

Plugin: OracleDB

Control ID: 90c5ff0d43e0b4f5e9108c12159e558167c9e717a1a0c71afd58dc8c2ff6b709