STIG ID: UBTU-22-412010 | SRG: SRG-OS-000480-GPOS-00226 | Severity: low | CCI: | Vulnerability Id: V-260550
Limiting the number of logon attempts over a certain time interval reduces the chances that an unauthorized user may gain access to an account.
Configure Ubuntu 22.04 LTS to enforce a delay of at least four seconds between logon prompts following a failed logon attempt.
Add or modify the following line in the "/etc/pam.d/common-auth" file:
auth required pam_faildelay.so delay=4000000
Verify Ubuntu 22.04 LTS enforces a delay of at least four seconds between logon prompts following a failed logon attempt by using the following command:
$ grep pam_faildelay /etc/pam.d/common-auth
auth required pam_faildelay.so delay=4000000
If "delay" is not set to "4000000" or greater, the line is commented out, or is missing, this is a finding.