
- [XLS]
MITRE ATT&CK®
Disable Crypto Hardware Reduce Key Space Adversary-in-the-Middle Brute Force Credentials from Password Stores Exploitation for Credential Access Forced Authentication
- [XLS]
CISA
This goal is particularly important for organizations that lack widespread implementation of MFA and capabilities to protect against brute force attacks (such as Web Application Firewalls and third-party …
- [XLS]
Mississippi
Vendor is required to provide a recommendation for a consistent duration (7 days, 14 days, 21 days, etc.) for brute force assessments so that consistent metrics for comparing password strength can be …
- [XLS]
Smartsheet
While we strive to keep the information up to date and correct, we make no representations or warranties of any kind, express or implied, about the completeness, accuracy, reliability, suitability, or …
- [XLS]
OWASP
If an account is temporarily soft locked out due to a brute force attack, this should not reset the hard lock status. Verify that if knowledge based questions (also known as "secret questions") are required, the …
Determine the Goals, Scope and Objectives of the vulnerability assessment. Goals:
- [XLS]
Spurtcommerce
- Determine the resistance of the application against brute force password guessing using available password dictionaries by evaluating the length, complexity, reuse, and aging requirements of …
- [XLS]
HHS 405(d)
This goal is particularly important for organizations that lack widespread implementation of MFA and capabilities to protect against brute-force attacks (such as web application firewalls and third-party …
For example, brute force attacks can be obfuscated by conducting them from multiple machines, thereby circumventing traditional lockout rules for 3 or 5 failed logins from a single IP address.
Completing all questions under the Vendor Review section is mandatory, while for the Core Security Requirements section, you may indicate . "N/A" with a concise explanation if any item is not …