STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 4 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to SUSE Linux Enterprise Server v11 for System z Security Technical Implementation Guide

V-11973

CAT II (Medium)

The system must require passwords contain at least one special character.

Rule ID

SV-44876r1_rule

STIG

SUSE Linux Enterprise Server v11 for System z Security Technical Implementation Guide

Version

V1R12

CCIs

CCI-001619

Discussion

To enforce the use of complex passwords, minimum numbers of characters of different classes are mandated. The use of complex passwords reduces the ability of attackers to successfully obtain valid passwords using guessing or exhaustive search techniques. Complexity requirements increase the password search space by requiring users to construct passwords from a larger character set than they may otherwise use.

Check Content

Check the ocredit setting.

Procedure:
Check the password ocredit option
# grep pam_cracklib.so /etc/pam.d/common-password-pc

Confirm the ocredit option is set to -1 as in the example:

password required pam_cracklib.so ocredit=-1

There may be other options on the line. If no such line is found, or the ocredit is not -1 this is a finding.

Fix Text

Edit "/etc/pam.d/common-password-pc" to include the line:

password required pam_cracklib.so ocredit=-1