DoD STIGs – V-32459

Overview:

Title: The DBMS must support organizational requirements to disable user accounts after an organization defined time period of inactivity.

Vulnerability ID: V-32459

STIG ID:

IA Controls: None

Severity: medium

Description: Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks.

To meet password policy requirements, passwords need to be changed at specific policy based intervals.

If the information system or application allows the user to consecutively reuse their password when that password has exceeded its defined lifetime, the end result is a password that is not changed as per policy requirements.

Unused or expired DBMS accounts provide a means for undetected, unauthorized access to the database.

Check Text: Verify accounts that have been inactive or expired for longer than the organization defined time period have been disabled. If inactive or expired accounts are not disabled, this is a finding.

Fix Text: Disable accounts that have been inactive or expired longer than the organization defined time period.

[divider]

Interpreting V-32459:

Coming Soon!

Return to the DoD STIGs – Database Security Requirements Guide

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.