Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-209052 | OL6-00-000372 | SV-209052r603263_rule | Medium |
Description |
---|
Users need to be aware of activity that occurs regarding their account. Providing users with information regarding the number of unsuccessful attempts that were made to login to their account allows the user to determine if any unauthorized activity has occurred and gives them an opportunity to notify administrators. |
STIG | Date |
---|---|
Oracle Linux 6 Security Technical Implementation Guide | 2021-06-14 |
Check Text ( C-9305r357941_chk ) |
---|
To ensure that last logon/access notification is configured correctly, run the following command: # grep pam_lastlog.so /etc/pam.d/system-auth The output should show output "showfailed". If that is not the case, this is a finding. |
Fix Text (F-9305r357942_fix) |
---|
To configure the system to notify users of last logon/access using "pam_lastlog", add the following line immediately after "session required pam_limits.so": session required pam_lastlog.so showfailed |