STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 4 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to SUSE Linux Enterprise Server v11 for System z Security Technical Implementation Guide

V-22305

CAT II (Medium)

The system must require passwords contain at least one lowercase alphabetic character.

Rule ID

SV-44867r1_rule

STIG

SUSE Linux Enterprise Server v11 for System z Security Technical Implementation Guide

Version

V1R12

CCIs

CCI-000193

Discussion

To enforce the use of complex passwords, minimum numbers of characters of different classes are mandated. The use of complex passwords reduces the ability of attackers to successfully obtain valid passwords using guessing or exhaustive search techniques. Complexity requirements increase the password search space by requiring users to construct passwords from a larger character set than they may otherwise use.

Check Content

Check /etc/pam.d/common-password for lcredit setting.

Procedure:
Check the password lcredit option
# grep pam_cracklib.so /etc/pam.d/common-password

Confirm the lcredit option is set to -1 as in the example:

password required pam_cracklib.so lcredit=-1

There may be other options on the line. If no such line is found, or the lcredit is not -1 this is a finding.

Fix Text

Edit "/etc/pam.d/common-password" to include the line:

password required pam_cracklib.so lcredit=-1