
- [XLS]
MITRE ATT&CK®
Disable Crypto Hardware Reduce Key Space Adversary-in-the-Middle Brute Force Credentials from Password Stores Exploitation for Credential Access Forced Authentication
- [XLS]
CISA
This goal is particularly important for organizations that lack widespread implementation of MFA and capabilities to protect against brute force attacks (such as Web Application Firewalls and …
- [XLS]
Mississippi
Vendor is required to provide a recommendation for a consistent duration (7 days, 14 days, 21 days, etc.) for brute force assessments so that consistent metrics for comparing password …
- [XLS]
Smartsheet
While we strive to keep the information up to date and correct, we make no representations or warranties of any kind, express or implied, about the completeness, accuracy, reliability, …
- [XLS]
OWASP
If an account is temporarily soft locked out due to a brute force attack, this should not reset the hard lock status. Verify that if knowledge based questions (also known as "secret questions") …
Determine the Goals, Scope and Objectives of the vulnerability assessment. Goals:
- [XLS]
Spurtcommerce
- Determine the resistance of the application against brute force password guessing using available password dictionaries by evaluating the length, complexity, reuse, and aging …
- [XLS]
HHS 405(d)
This goal is particularly important for organizations that lack widespread implementation of MFA and capabilities to protect against brute-force attacks (such as web application firewalls and …
For example, brute force attacks can be obfuscated by conducting them from multiple machines, thereby circumventing traditional lockout rules for 3 or 5 failed logins from a single IP address.
Completing all questions under the Vendor Review section is mandatory, while for the Core Security Requirements section, you may indicate . "N/A" with a concise explanation if any item …