Ensure that account lock threshold is configured within your OCI IAM password policy to deter brute-force attacks. This threshold defines the number of consecutive, unsuccessful login attempts that will lock an account within the OCI Identity Domain. Implementing a reasonable limit (e.g., 5 failures) is a security best practice that protects accounts while balancing user convenience. You can also specify a period (5 minutes to 24 hours) after which locked accounts automatically unlock.
The account lock threshold dictates the maximum number of consecutive, unsuccessful login attempts permitted before a user's account is locked within the Identity Domain. Setting this threshold to 0 (zero) effectively disables the lock mechanism. This means that any number of failed login attempts can occur without the system enforcing a lock, resulting in the user's account never being locked due to repeated login failures.
Audit
To determine if account lock threshold is configured in your OCI IAM password policy, perform the following operations:
Remediation / Resolution
To ensure that account lock threshold is configured within your OCI IAM password policy, perform the following operations:
References
- Oracle Cloud Infrastructure Documentation
- Managing Password Policies
- Modifying the Custom Password Policy
- Creating a Password Policy
- Oracle Cloud Infrastructure CLI Documentation
- compartment list
- domain list
- password-policies list
- password-policy get
- password-policy put