STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 4 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Samsung SDS EMM Security Technical Implementation Guide

V-245529

CAT II (Medium)

The Samsung SDS EMM local accounts must prohibit password reuse for a minimum of five generations.

Rule ID

SV-245529r836816_rule

STIG

Samsung SDS EMM Security Technical Implementation Guide

Version

V1R3

CCIs

CCI-000200

Discussion

Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. To meet password policy requirements, passwords need to be changed at specific policy-based intervals. If the information system or application allows the user to consecutively reuse their password when that password has exceeded its defined lifetime, the end result is a password that is not changed as per policy requirements. SFR ID: FMT_SMF.1(2)b. / IA-5 (1) (e)

Check Content

Verify Samsung SDS EMM local accounts have been configured to prohibit password reuse for a minimum of five generations.

1. Log in to the SDS EMM console.
2. Go to Setting >> Server >> Configuration >> Manage Password History (Times).
3. Verify the Manage Password History (Times) is set to 5.

If the Manage Password History (Times) is not set to 5, this is a finding.

Fix Text

Configure Samsung SDS EMM local accounts to prohibit password reuse for a minimum of five generations. On the MDM console, do the following: 

1.  Log in to the SDS EMM console.
2.  Go to Setting >> Server >> Configuration >> Manage Password History (Times).
3.  Set the Manage Password History (Times) to 5.
4.  Save setting.