AC-7: Unsuccessful Logon Attempts
Control Family:
CSF v1.1 References:
Threats Addressed:
Baselines:
- Low
- AC-7
- Moderate
- AC-7
- High
- AC-7
Next Version:
- NIST Special Publication 800-53 Revision 5:
- AC-7: Unsuccessful Logon Attempts
Control Statement
The information system:
- Enforces a limit of [Assignment: organization-defined number] consecutive invalid logon attempts by a user during a [Assignment: organization-defined time period]; and
- Automatically [Selection: locks the account/node for an [Assignment: organization-defined time period]; locks the account/node until released by an administrator; delays next logon prompt according to [Assignment: organization-defined delay algorithm]] when the maximum number of unsuccessful attempts is exceeded.
Supplemental Guidance
This control applies regardless of whether the logon occurs via a local or network connection. Due to the potential for denial of service, automatic lockouts initiated by information systems are usually temporary and automatically release after a predetermined time period established by organizations. If a delay algorithm is selected, organizations may choose to employ different algorithms for different information system components based on the capabilities of those components. Responses to unsuccessful logon attempts may be implemented at both the operating system and the application levels.
Control Enhancements
AC-7(2): Purge / Wipe Mobile Device
Baseline(s):
The information system purges/wipes information from [Assignment: organization-defined mobile devices] based on [Assignment: organization-defined purging/wiping requirements/techniques] after [Assignment: organization-defined number] consecutive, unsuccessful device logon attempts.