Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-203782 | SRG-OS-000480-GPOS-00229 | SV-203782r877377_rule | High |
Description |
---|
Failure to restrict system access to authenticated users negatively impacts operating system security. |
STIG | Date |
---|---|
General Purpose Operating System Security Requirements Guide | 2023-12-01 |
Check Text ( C-3907r375737_chk ) |
---|
If the operating system provides a public access service, such as a kiosk, this is not applicable. Verify the operating system does not allow an unattended or automatic logon to the system. If it does, this is a finding. Automatic logon as an authorized user allows access to any user with physical access to the operating system. |
Fix Text (F-3907r375738_fix) |
---|
If the operating system provides a public access service, such as a kiosk, this is not applicable. Configure the operating system to not allow an unattended or automatic logon to the system. Automatic logon as an authorized user allows access to any user with physical access to the operating system. |