Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-4298 | GEN001000 | SV-27148r2_rule | ECSC-1 | Medium |
Description |
---|
The remote console feature provides an additional means of access to the system which could allow unauthorized access if not disabled or properly secured. With virtualization technologies, remote console access is essential as there is no physical console for virtual machines. Remote console access must be protected in the same manner as any other remote privileged access method. |
STIG | Date |
---|---|
HP-UX 11.31 Security Technical Implementation Guide | 2017-12-08 |
Check Text ( C-28074r3_chk ) |
---|
Check /etc/securetty # more /etc/securetty If the /etc/securetty file does not exist, or contains other than "console" or "/dev/null" this is a finding. |
Fix Text (F-24422r4_fix) |
---|
If the /etc/securetty file does not exist, create the file containing only the word console and ensure correct file properties. # echo “console” > /etc/securetty |