UCF STIG Viewer Logo

The system must limit users to 10 simultaneous system logins, or a site-defined number, in accordance with operational requirements.


Overview

Finding ID Version Rule ID IA Controls Severity
V-22298 GEN000450 SV-26319r1_rule ECSC-1 Low
Description
Limiting simultaneous user logins can insulate the system from Denial of Service problems caused by excessive logins. Automated login processes operating improperly or maliciously may result in an exceptional number of simultaneous login sessions. If the defined value of 10 logins does not meet operational requirements, the site may define the permitted number of simultaneous login sessions based on operational requirements. This limit is for the number of simultaneous login sessions for EACH user account. This is NOT a limit on the total number of simultaneous login sessions on the system.
STIG Date
HP-UX 11.31 Security Technical Implementation Guide 2013-03-28

Details

Check Text ( C-36260r1_chk )
Check the NUMBER_OF_LOGINS_ALLOWED setting in /etc/default/security.

# cat /etc/default/security | grep NUMBER_OF_LOGINS_ALLOWED

If the setting is not present, this is a finding.
Fix Text (F-31517r1_fix)
Edit /etc/default/security and configure a NUMBER_OF_LOGINS_ALLOWED setting. The enforced maximum should be defined by site requirements and policy.