Details
Systems must employ cryptographic hashes for passwords using the SHA-2 family of algorithms or FIPS 140-2 approved successors. The use of unapproved algorithms may result in weak password hashes more vulnerable to compromise.
Solution
To set the remember option, add or correct the following line in ‘/etc/pam.d/passwd’:
password sufficient /lib/security/$ISA/pam_unix.so use_authtok nullok shadow sha512 remember=5
Supportive Information
The following resource is also helpful.
This security hardening control applies to the following category of controls within NIST 800-53: Configuration Management.This control applies to the following type of system Unix.
References
- 800-53|CM-6b.
- CAT|II
- CCI|CCI-000366
- Group-ID|V-63235
- Rule-ID|SV-77725r1_rule
- STIG-ID|ESXI-06-000033
- Vuln-ID|V-63235