UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The system must prevent the root account from directly logging in except from the system console.


Overview

Finding ID Version Rule ID IA Controls Severity
V-778 GEN000980 SV-37374r1_rule ECPA-1 ECSD-2 Medium
Description
Limiting the root account direct logins to only system consoles protects the root account from direct unauthorized access from a non-console device.
STIG Date
Red Hat Enterprise Linux 5 Security Technical Implementation Guide 2013-01-17

Details

Check Text ( C-36060r1_chk )
Check /etc/securetty
# more /etc/securetty
If the file does not exist, or contains more than "console" or a single "tty" device this is a finding.
Fix Text (F-31305r1_fix)
Create if needed and set the contents of /etc/securetty to a "console" or "tty" device.
# echo console > /etc/securetty
or
# echo tty1 > /etc/securetty