STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated just now
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to HPE 3PAR SSMC Operating System Security Technical Implementation Guide

V-255241

CAT II (Medium)

SSMC must enforce a minimum 15-character password length.

Rule ID

SV-255241r986299_rule

STIG

HPE 3PAR SSMC Operating System Security Technical Implementation Guide

Version

V2R1

CCIs

CCI-004066

Discussion

The shorter the password, the lower the number of possible combinations that need to be tested before the password is compromised. Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. Password length is one factor of several that helps to determine strength and how long it takes to crack a password. Use of more characters in a password helps to exponentially increase the time and/or resources required to compromise the password.

Check Content

To verify that the 15-character minimum password length policy is set, do the following: 

1. Log on to SSMC appliance as ssmcadmin. Press "X" to escape to shell.

2. Execute the following command:

$ sudo /ssmc/bin/config_security.sh -o long_password_policy -a status
Long password policy is enabled

If the status does not read "enabled", this is a finding.

Fix Text

To enable and enforce the 15-character minimum password length policy, do the following: 

1. Log on to SSMC appliance as ssmcadmin. Press "X" to escape to general bash shell.

2. Execute the following command:

$ sudo /ssmc/bin/config_security.sh -o long_password_policy -a enable -f

Note: ssmcaudit user should be disabled before executing this fix procedure.