compliance controls are associated with this Policy definition 'Enforce a limit of consecutive failed login attempts' (b4409bff-2287-8407-05fd-c73175a68302)
Control Domain |
Control |
Name |
MetadataId |
Category |
Title |
Owner |
Requirements |
Description |
Info |
Policy# |
FedRAMP_High_R4 |
AC-7 |
FedRAMP_High_R4_AC-7 |
FedRAMP High AC-7 |
Access Control |
Unsuccessful Logon Attempts |
Shared |
n/a |
The information system:
a. Enforces a limit of [Assignment: organization-defined number] consecutive invalid logon attempts by a user during a [Assignment: organization-defined time period]; and
b. Automatically [Selection: locks the account/node for an [Assignment: organization-defined time period]; locks the account/node until released by an administrator; delays next logon prompt according to [Assignment: organization-defined delay algorithm]] when the maximum number of unsuccessful attempts is exceeded.
Supplemental Guidance: This control applies regardless of whether the logon occurs via a local or network connection. Due to the potential for denial of service, automatic lockouts initiated by information systems are usually temporary and automatically release after a predetermined time period established by organizations. If a delay algorithm is selected, organizations may choose to employ different algorithms for different information system components based on the capabilities of those components. Responses to unsuccessful logon attempts may be implemented at both the operating system and the application levels. Related controls: AC-2, AC-9, AC-14, IA-5.
References: None. |
link |
1 |
FedRAMP_Moderate_R4 |
AC-7 |
FedRAMP_Moderate_R4_AC-7 |
FedRAMP Moderate AC-7 |
Access Control |
Unsuccessful Logon Attempts |
Shared |
n/a |
The information system:
a. Enforces a limit of [Assignment: organization-defined number] consecutive invalid logon attempts by a user during a [Assignment: organization-defined time period]; and
b. Automatically [Selection: locks the account/node for an [Assignment: organization-defined time period]; locks the account/node until released by an administrator; delays next logon prompt according to [Assignment: organization-defined delay algorithm]] when the maximum number of unsuccessful attempts is exceeded.
Supplemental Guidance: This control applies regardless of whether the logon occurs via a local or network connection. Due to the potential for denial of service, automatic lockouts initiated by information systems are usually temporary and automatically release after a predetermined time period established by organizations. If a delay algorithm is selected, organizations may choose to employ different algorithms for different information system components based on the capabilities of those components. Responses to unsuccessful logon attempts may be implemented at both the operating system and the application levels. Related controls: AC-2, AC-9, AC-14, IA-5.
References: None. |
link |
1 |
ISO27001-2013 |
A.9.4.2 |
ISO27001-2013_A.9.4.2 |
ISO 27001:2013 A.9.4.2 |
Access Control |
Secure log-on procedures |
Shared |
n/a |
Where required by the access control policy, access to systems and applications shall be controlled by a secure log-on procedure. |
link |
17 |
NIST_SP_800-171_R2_3 |
.1.8 |
NIST_SP_800-171_R2_3.1.8 |
NIST SP 800-171 R2 3.1.8 |
Access Control |
Limit unsuccessful logon attempts. |
Shared |
Microsoft and the customer share responsibilities for implementing this requirement. |
This requirement applies regardless of whether the logon occurs via a local or network connection. Due to the potential for denial of service, automatic lockouts initiated by systems are, in most cases, temporary and automatically release after a predetermined period established by the organization (i.e., a delay algorithm). If a delay algorithm is selected, organizations may employ different algorithms for different system components based on the capabilities of the respective components. Responses to unsuccessful logon attempts may be implemented at the operating system and application levels. |
link |
1 |
NIST_SP_800-53_R4 |
AC-7 |
NIST_SP_800-53_R4_AC-7 |
NIST SP 800-53 Rev. 4 AC-7 |
Access Control |
Unsuccessful Logon Attempts |
Shared |
n/a |
The information system:
a. Enforces a limit of [Assignment: organization-defined number] consecutive invalid logon attempts by a user during a [Assignment: organization-defined time period]; and
b. Automatically [Selection: locks the account/node for an [Assignment: organization-defined time period]; locks the account/node until released by an administrator; delays next logon prompt according to [Assignment: organization-defined delay algorithm]] when the maximum number of unsuccessful attempts is exceeded.
Supplemental Guidance: This control applies regardless of whether the logon occurs via a local or network connection. Due to the potential for denial of service, automatic lockouts initiated by information systems are usually temporary and automatically release after a predetermined time period established by organizations. If a delay algorithm is selected, organizations may choose to employ different algorithms for different information system components based on the capabilities of those components. Responses to unsuccessful logon attempts may be implemented at both the operating system and the application levels. Related controls: AC-2, AC-9, AC-14, IA-5.
References: None. |
link |
1 |
NIST_SP_800-53_R5 |
AC-7 |
NIST_SP_800-53_R5_AC-7 |
NIST SP 800-53 Rev. 5 AC-7 |
Access Control |
Unsuccessful Logon Attempts |
Shared |
n/a |
a. Enforce a limit of [Assignment: organization-defined number] consecutive invalid logon attempts by a user during a [Assignment: organization-defined time period]; and
b. Automatically [Selection (OneOrMore): lock the account or node for an [Assignment: organization-defined time period] ;lock the account or node until released by an administrator;delay next logon prompt per [Assignment: organization-defined delay algorithm] ;notify system administrator;take other [Assignment: organization-defined action] ] when the maximum number of unsuccessful attempts is exceeded. |
link |
1 |
|
op.acc.2 Access requirements |
op.acc.2 Access requirements |
404 not found |
|
|
|
n/a |
n/a |
|
64 |
|
op.acc.5 Authentication mechanism (external users) |
op.acc.5 Authentication mechanism (external users) |
404 not found |
|
|
|
n/a |
n/a |
|
72 |
|
op.acc.6 Authentication mechanism (organization users) |
op.acc.6 Authentication mechanism (organization users) |
404 not found |
|
|
|
n/a |
n/a |
|
78 |
PCI_DSS_v4.0 |
8.3.4 |
PCI_DSS_v4.0_8.3.4 |
PCI DSS v4.0 8.3.4 |
Requirement 08: Identify Users and Authenticate Access to System Components |
Strong authentication for users and administrators is established and managed |
Shared |
n/a |
Invalid authentication attempts are limited by:
• Locking out the user ID after not more than 10 attempts.
• Setting the lockout duration to a minimum of 30 minutes or until the user’s identity is confirmed. |
link |
1 |