![]() ![]() Use of a complex password helps to increase the time and resources required to compromise the password. The HPE Nimble must enforce password complexity by requiring that at least one special character be used. The HPE Nimble must initiate a session lock after a 15-minute period of inactivity.Ī session lock is a temporary network device or administrator-initiated action taken when the administrator stops work but does not log out of the network device. The HPE Nimble must be configured to enforce the limit of three consecutive invalid logon attempts, after which time it must block any login attempt for 15 minutes.īy limiting the number of failed login attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-forcing, is reduced. Terminating an idle session within a short time period reduces the window of opportunity for unauthorized personnel to take control of a management session enabled on the console or console port. The HPE Nimble must terminate all network connections associated with a device management session at the end of the session, or the session must be terminated after 10 minutes of inactivity. Network devices running an unsupported operating system lack current security fixes required to mitigate the risks associated with recent vulnerabilities. The HPE Nimble must be running an operating system release that is currently supported by the vendor. If these alerts are also sent to the syslog, this. The HPE Nimble must forward critical alerts (at a minimum) to the system administrators and the ISSO.Īlerts are essential to let the system administrators and security personnel know immediately of issues which may impact the system or users. This control is particularly important protection against the insider threat. The HPE Nimble must be configured to use an authentication server for the purpose of authenticating users prior to granting administrative access.Ĭentralized management of authentication settings increases the security of remote and nonlocal access methods. Findings (MAC III - Administrative Sensitive) Finding ID ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |