NIST Special Publication 800-171 Revision 2

Date Published: January 28th, 2021

Withdrawn on May 14, 2024. Superseded by SP 800-171 Rev. 3

Author(s): Ron Ross (NIST), Victoria Pillitteri (NIST), Kelley Dempsey (NIST), Mark Riddle (NARA), Gary Guissanie (IDA)

Note: A Class Deviation is in effect as of May 2, 2024 (DEVIATION 2024O0013). The deviation clause requires contractors, who are subject to 252.204-7012, to comply with National Institute of Standards and Technology (NIST) Special Publication (SP) 800-171 Revision 2, instead of the version of NIST SP 800-171 in effect at the time the solicitation is issued or as authorized by the contracting officer. Click Here

AC-3.1.8 Limit unsuccessful logon attempts.

Control Family: Access Control

Control Type: Derived

SPRS Value: 1

CMMC Level(s):

AC.L2-3.1.8

Top Ten Failed Requirement:

No

Referenced in:

DFARS 252.204-7012

Derived From: NIST SP 800-53r4

AC-7

Discussion:

This requirement applies regardless of whether the logon occurs via a local or network connection. Due to the potential for denial of service, automatic lockouts initiated by systems are, in most cases, temporary and automatically release after a predetermined period established by the organization (i.e., a delay algorithm). If a delay algorithm is selected, organizations may employ different algorithms for different system components based on the capabilities of the respective components. Responses to unsuccessful logon attempts may be implemented at the operating system and application levels.

Determining Statements (NIST SP 800-171Ar2)

Upon assessment, assessors must determine if-

3.1.8[a] the means of limiting unsuccessful logon attempts is defined.
3.1.8[b] the defined means of limiting unsuccessful logon attempts is implemented.

Assessors are instructed to-

Examine: [SELECT FROM: Access control policy; procedures addressing unsuccessful logon attempts; system security plan; system design documentation; system configuration settings and associated documentation; system audit logs and records; other relevant documents or records].

Interview: [SELECT FROM: Personnel with information security responsibilities; system developers; system or network administrators].

Test: [SELECT FROM: Mechanisms implementing access control policy for unsuccessful logon attempts].

Possible Solutions Based on Staffing


1-10 FTE
10-49 FTE
50-249 FTE
250-999 FTE
1000+ FTE
Cimcor CimTrak Cimcor CimTrak Cimcor CimTrak Cimcor CimTrak CyberArk
Netwrix Auditor Netwrix Auditor Netwrix Auditor Netwrix Auditor Netwrix Auditor
Microsoft Intune Microsoft Intune Microsoft Intune Microsoft Intune Microsoft Intune
DIA STIGs DISA STIGs Tripwire Enterprise Tripwire Enterprise Tripwire Enterprise
DISA STIGs DISA STIGs DISA STIGs
CIS Benchmarks CIS Benchmarks CIS Benchmarks

Control Families

3.1: Access Control

3.2: Awareness and Training

3.3: Audit and Accountability

3.4: Configuration Management

3.5: Identification and Authentication

3.6: Incident Response

3.7: Maintenance

3.8: Media Protection

3.9: Personnel Security

3.10: Physical Protection

3.11: Risk Assessment

3.12: Security Assessment

3.13: System and Communications Protection

3.14: System and Information Integrity