DISA STIGS Viewer

Okta must enforce 24 hours/one day as the minimum password lifetime.

Overview

Finding ID Version Rule ID IA Controls Severity
V-273200 OKTA-APP-000740 SV-273200r1098867_rule   Medium
Description
Enforcing a minimum password lifetime helps prevent repeated password changes to defeat the password reuse or history enforcement requirement. Restricting this setting limits the user's ability to change their password. Passwords must be changed at specific policy-based intervals; however, if the application allows the user to immediately and continually change their password, it could be changed repeatedly in a short period of time to defeat the organization's policy regarding password reuse. Satisfies: SRG-APP-000173, SRG-APP-000870
STIG Date
Okta Identity as a Service (IDaaS) Security Technical Implementation Guide 2025-05-06

Details

Check Text (C-77291r1098865_chk)
From the Admin Console:
1. Select Security >> Authenticators.
2. Click the "Actions" button next to the "Password" row and select "Edit".
3. For each listed policy, verify "Minimum password age is XX hours" is set to at least "24".

For each policy, if "Minimum password age is XX hours" is not set to at least "24", this is a finding.
Fix Text (F-77196r1098866_fix)
From the Admin Console:
1. Select Security >> Authenticators.
2. Click the "Actions" button next to the "Password" row and select "Edit".
3. For each listed policy:
- Click "Edit".
- Set "Minimum password age is XX hours" to at least "24".