Other Articles

Servers – Ensure Password Reuse is Limited

Support > Fixing Checks > Server

06 March, 2026

This check ensures that password reuse is limited by enforcing password history policies.

Limiting password reuse prevents users from recycling old passwords, reducing the risk of unauthorized access due to compromised credentials.

Check Details

  • Resource: Server
  • Check: Ensure password reuse is limited
  • Risk: Allowing password reuse increases the likelihood of attackers gaining access using previously compromised passwords.

Remediation Steps

  1. Open a terminal session on the server with root or sudo privileges.
  2. Identify the appropriate PAM configuration file based on your system:

    # Ubuntu/Debian
    sudo nano /etc/pam.d/common-password
    
    # RHEL/CentOS
    sudo nano /etc/pam.d/system-auth
    
  3. Add or modify the configuration to enforce password history using one of the following options:

    # Recommended (pam_pwhistory)
    password required pam_pwhistory.so remember=5
    
    # Alternative (pam_unix)
    password required pam_unix.so remember=5
    
  4. Save the file and exit the editor.
  5. Ensure the configuration is applied by checking the file:

    grep remember /etc/pam.d/common-password
    # OR
    grep remember /etc/pam.d/system-auth
    
  6. No service restart is typically required, but ensure users change passwords to enforce the new policy.
  7. Perform regular audits to ensure compliance with password policies.