STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to SUSE Linux Enterprise Server v11 for System z Security Technical Implementation Guide

V-22307

CAT II (Medium)

The system must prevent the use of dictionary words for passwords.

Rule ID

SV-44883r1_rule

STIG

SUSE Linux Enterprise Server v11 for System z Security Technical Implementation Guide

Version

V1R12

CCIs

CCI-000189

Discussion

An easily guessable password provides an open door to any external or internal malicious intruder. Many computer compromises occur as the result of account name and password guessing. This is generally done by someone with an automated script that uses repeated logon attempts until the correct account and password pair is guessed. Utilities, such as cracklib, can be used to validate passwords are not dictionary words and meet other criteria during password changes.

Check Content

Check /etc/pam.d/common-password for pam_cracklib configuration.
# grep pam_cracklib /etc/pam.d/common-password*
If pam_cracklib is not present, this is a finding.



Ensure the passwd command uses the common-password settings.
# grep common-password /etc/pam.d/passwd

If a line "password include common-password" is not found then the password checks in common-password will not be applied to new passwords, this is a finding.

Fix Text

Edit /etc/pam.d/common-password and configure pam_cracklib by adding a line such as "password  required pam_cracklib.so"