STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 4 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to SUSE Linux Enterprise Micro (SLEM) 5 Security Technical Implementation Guide

V-261360

CAT II (Medium)

SLEM 5 must disable account identifiers (individuals, groups, roles, and devices) after 35 days of inactivity after password expiration.

Rule ID

SV-261360r996529_rule

STIG

SUSE Linux Enterprise Micro (SLEM) 5 Security Technical Implementation Guide

Version

V1R4

CCIs

CCI-000795

Discussion

Inactive identifiers pose a risk to systems and applications because attackers may exploit an inactive identifier and potentially obtain undetected access to the system. Owners of inactive accounts will not notice if unauthorized access to their user account has been obtained. SLEM 5 must track periods of inactivity and disable application identifiers after 35 days of inactivity.

Check Content

Verify SLEM 5 disables account identifiers after 35 days of inactivity after the password expiration with the following command:

     > sudo grep -i '^inactive' /etc/default/useradd
     INACTIVE=35

If the value for "INACTIVE" is not set to a value greater than "0" and less than or equal to "35", if the line is commented out, or the line is missing, this is a finding.

Fix Text

Configure SLEM 5 to disable account identifiers after 35 days of inactivity after the password expiration.

Run the following command to change the configuration for "useradd" to disable the account identifier after "35" days:

     > sudo useradd -D -f 35

DOD recommendation is "35" days, but a lower value greater than "0" is acceptable.