STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to Canonical Ubuntu 20.04 LTS Security Technical Implementation Guide

V-238237

CAT III (Low)

The Ubuntu operating system must enforce a delay of at least 4 seconds between logon prompts following a failed logon attempt.

Rule ID

SV-238237r991588_rule

STIG

Canonical Ubuntu 20.04 LTS Security Technical Implementation Guide

Version

V2R4

CCIs

CCI-000366

Discussion

Limiting the number of logon attempts over a certain time interval reduces the chances that an unauthorized user may gain access to an account.

Check Content

Verify the Ubuntu operating system enforces a delay of at least 4 seconds between logon prompts following a failed logon attempt with the following command: 
 
$ grep pam_faildelay /etc/pam.d/common-auth 
 
auth    required    pam_faildelay.so    delay=4000000 
 
If the line is not present or is commented out, this is a finding.

Fix Text

Configure the Ubuntu operating system to enforce a delay of at least 4 seconds between logon prompts following a failed logon attempt. 
 
Edit the file "/etc/pam.d/common-auth" and set the parameter "pam_faildelay" to a value of  4000000 or greater: 
 
auth    required    pam_faildelay.so    delay=4000000