STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 4 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Nutanix AOS 5.20.x OS Security Technical Implementation Guide

V-254215

CAT II (Medium)

Nutanix AOS must require the maximum number of repeating characters be limited to three when passwords are changed.

Rule ID

SV-254215r982198_rule

STIG

Nutanix AOS 5.20.x OS Security Technical Implementation Guide

Version

V1R2

CCIs

CCI-000195

Discussion

If the operating system allows the user to consecutively reuse extensive portions of passwords, this increases the chances of password compromise by increasing the window of opportunity for attempts at guessing and brute-force attacks. The number of changed characters refers to the number of changes required with respect to the total number of positions in the current password. In other words, characters may be the same within the two passwords; however, the positions of the like characters must be different. If the password length is an odd number then number of changed characters must be rounded up. For example, a password length of 15 characters must require the change of at least eight characters.

Check Content

Verify Nutanix AOS is configured to require complex passwords.

$ sudo grep maxrepeat /etc/security/pwquality.conf 
maxrepeat = 2

If the value of "maxrepeat" is set to more than "2", this is a finding.

Fix Text

Configure the complex password requirements by running the following command:

$ ncli cluster edit-cvm-security-params enable-high-strength-password=true