STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated just now
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to ForeScout CounterACT NDM Security Technical Implementation Guide

V-255648

CAT II (Medium)

CounterACT must enforce a 60-day maximum password lifetime restriction.

Rule ID

SV-255648r961863_rule

STIG

ForeScout CounterACT NDM Security Technical Implementation Guide

Version

V1R2

CCIs

CCI-000199CCI-000366

Discussion

Any password, no matter how complex, can eventually be cracked. Therefore, passwords need to be changed at specific intervals. One method of minimizing this risk is to use complex passwords and periodically change them. If the network device does not limit the lifetime of passwords and force users to change their passwords, there is the risk that the passwords could be compromised. This requirement does not include root account or the account of last resort which are meant for access to the network device in case of failure.

Check Content

Determine if CounterACT enforces a 60-day maximum password lifetime. This requirement may be verified by demonstration or configuration review. This requirement does not include root account or the account of last resort.

1. Log on to the CounterACT Administrator UI.
2. From the menu, select Tools >> Options >> User Console and Options >> Password and Login.
3. Verify the "password expires after" radio button is selected and configured to 60 days.

If CounterACT does not enforce a 60-day maximum password lifetime, this is a finding.

Fix Text

Configure CounterACT to enforce a 60-day maximum password lifetime.

1. Log on to the CounterACT Administrator UI.
2. From the menu, select Tools >> Options >> User Console and Options >> Password and Login.
3. Verify the "password expires after" radio button is selected and configured to 60 days.

This requirement does not include root account or the account of last resort.