1. Home
  2. Security Hardening
  3. CIS Palo Alto Firewall 8 Benchmark L1 V1.0.0
  4. Ensure ‘Failed Attempts’ and ‘Lockout Time’ for Authentication Profile are properly configured – Failed Attempts

Ensure ‘Failed Attempts’ and ‘Lockout Time’ for Authentication Profile are properly configured – Failed Attempts

Details

Configure values for Failed Login Attempts and Account Lockout Time set to organization-defined values (for example, 3 failed attempts and a 15 minute lockout time). Do not set Failed Attempts and Lockout Time in the Authentication Settings section; any Failed Attempts or Lockout Time settings within the selected Authentication Profile do not apply in the Authentication Settings section.

Rationale:

Without a lockout limit, an attacker can continuously guess administrators passwords. If lockout settings are configured in the Authentication Settings section, it may be possible for an attacker to continuously lock out all administrative accounts from accessing the device.

Solution

Navigate to Device > Authentication Profile.
Set Failed Attempts to the non-zero organization-defined value.
Set Lockout Time to the non-zero organization-defined value.
Default Value:
Not configured

Supportive Information

The following resource is also helpful.

This security hardening control applies to the following category of controls within NIST 800-53: Access Control.This control applies to the following type of system Palo_Alto.

References

Source

Updated on July 16, 2022
Was this article helpful?

Related Articles