🛡️ Microsoft Entra ID Account Lockout Duration is not set 60 seconds or more🟢⚪
- Contextual name: 🛡️ Account Lockout Duration is not set 60 seconds or more🟢⚪
- ID:
/ce/ca/azure/microsoft-entra-id/account-lockout-duration - Tags:
- Policy Type:
COMPLIANCE_POLICY - Policy Categories:
SECURITY
Description
Description
The account lockout duration value determines how long an account retains the status of lockout, and therefore how long before a user can continue to attempt to login after passing the lockout threshold.
Rationale
Account lockout is a method of protecting against brute-force and password spray attacks. Once the lockout threshold has been exceeded, the account enters a locked-out state which prevents all login attempts for a variable duration. The lockout in combination with a reasonable duration reduces the total number of failed login attempts that a malicious actor can execute in a given period of time.
Impact
If account lockout duration is set too low (less than 60 seconds), malicious actors can perform more password spray and brute-force attempts over a given period of time.
If the account lockout duration is set too high (more than 300 seconds) users may experience inconvenient delays during lockout.
Audit
From Azure Portal
- From Azure Home select the Portal Menu.
- Select
Microsoft Entra ID.... see more
Remediation
Remediation
From Azure Portal
- From Azure Home select the Portal Menu.
- Select
Microsoft Entra ID.- Under
Manage, selectSecurity.- Under
Manage, selectAuthentication methods.- Under
Manage, selectPassword protection.- Set the
Lockout duration in secondsto60or higher.- Click
Save.
policy.yaml
Linked Framework Sections
| Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
|---|---|---|---|---|---|
| 💼 CIS Azure v3.0.0 → 💼 2.7 Ensure that account 'Lockout duration in seconds' is greater than or equal to '60' (Manual) | 1 | no data | |||
| 💼 CIS Azure v4.0.0 → 💼 6.7 Ensure that account 'Lockout duration in seconds' is greater than or equal to '60' (Manual) | 1 | no data | |||
| 💼 Cloudaware Framework → 💼 Credential Lifecycle Management | 18 | no data |