DISA STIGS Viewer

The Cisco ACI must be configured to enforce the limit of three consecutive invalid logon attempts, after which time it must block any login attempt for 15 minutes.

Overview

Finding ID Version Rule ID IA Controls Severity
V-271919 CACI-ND-000004 SV-271919r1114340_rule   Medium
Description
By limiting the number of failed login attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-forcing, is reduced. For Cisco ACI, when a user is in a locked-out state, the lockout is enforced in all nodes that are part of the fabric, including controllers and switches.
STIG Date
Cisco ACI NDM Security Technical Implementation Guide 2025-06-13

Details

Check Text (C-75969r1063904_chk)
1. On the GUI menu bar, choose Admin >> AAA.
2. In the Navigation pane, choose "Security".
3. In the Work pane, choose the Management Settings >> Policy tab.
4. Under Properties, verify the fields as follows:
- For Lockout User after multiple failed login attempts, choose "Enable".
- For Number of failed attempts before user is locked out, enter "3".
- For Time period in which consecutive attempts were failed (m), enter "15" or an organization-defined value.
- For Duration of lockout (m), enter "15".

If the Cisco ACI fabric is not configured to enforce the limit of three consecutive invalid logon attempts and lock out users for 15 minutes, this is a finding.
Fix Text (F-75876r1063905_fix)
1. On the GUI menu bar, choose Admin >> AAA.
2. In the Navigation pane, choose "Security".
3. In the Work pane, choose Management Settings >> Policy tab.
4. Under Properties, fill out the fields as follows:
- For Lockout User after multiple failed login attempts, choose "Enable".
- For Number of failed attempts before user is locked out, enter "3".
- For Time period in which consecutive attempts were failed (m), enter "15" (or an organization-defined value).
- For Duration of lockout (m), enter "15".
5. Click "Submit".