How to ensure that ssh jump host users are not using previous password set to meet security compliances such as PCI DSS , SOX, HIPAA , NIST , MAS, SOC2, FFIEC, NERC CIP , ISO 27001

To meet various security compliance like PCI DSS 3.2, SOX , HIPPA , NIST , MAS , FFIEC , SOC2, NERC CIP, ISO 27001 users should not be allowed to set a password that has been previously used. To ensure that users are using a different password from the previous ones when they reset their password, set the variable Settings->General->Security->Password/ Security Code Retries, so that when a user changes his password, the ssh jump host does not allow the last n passwords, n = number of password retries in settings plus one.

So you may set the number of password retries in settings to 2 to disallow the usage of the last 3 passwords.

password-retry

0 (0)
Article Rating (No Votes)
Rate this article
    Attached Files
    There are no attachments for this article.
    Related Articles RSS Feed
    How to enable google 2FA (Two factor Authentication) in ezeelogin ?
    Viewed 2026 times since Mon, Oct 9, 2017
    Record ssh sessions
    Viewed 1564 times since Fri, May 4, 2018
    Configure DUO 2FA in Ezeelogin SSH jumphost
    Viewed 1425 times since Thu, Nov 23, 2017
    Configure four eyes authorization
    Viewed 1338 times since Fri, Dec 1, 2017
    Enable Google reCaptcha
    Viewed 116 times since Fri, Feb 1, 2019
    Set SSH User Expiry
    Viewed 575 times since Thu, Sep 20, 2018
    Can I use Google 2FA, Yubikey , DUO simultaneously?
    Viewed 1838 times since Thu, Dec 14, 2017
    How to stream the ssh sessions in real time?
    Viewed 2282 times since Wed, Nov 22, 2017
    How to ensure that password are not recorded when ssh session recording is enabled to meet security compliances like PCI DSS 3.2 , HIPAA, SOX, SOC2, FFIEC, NERC CIP, ISO 27001 ?
    Viewed 1144 times since Fri, Mar 2, 2018
    encryption type used for securing users ssh logs in ezeelogin
    Viewed 1049 times since Thu, Jun 15, 2017