Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-765 | GEN000440 | SV-37178r1_rule | ECAR-1 ECAR-2 ECAR-3 | Medium |
Description |
---|
Monitoring and recording successful and unsuccessful logins assists in tracking unauthorized access to the system. Without this logging, the ability to track unauthorized activity to specific user accounts may be diminished. |
STIG | Date |
---|---|
Red Hat Enterprise Linux 5 Security Technical Implementation Guide | 2013-07-03 |
Check Text ( C-35882r1_chk ) |
---|
Determine if all logon attempts are being logged. Procedure: Verify successful logins are being logged: # last -R | more If the command does not return successful logins, this is a finding. Verify if unsuccessful logons are being logged: # lastb -R | more If the command does not return unsuccessful logins, this is a finding. |
Fix Text (F-31137r1_fix) |
---|
Make sure the collection files exist. Procedure: If there are no successful logins being returned from the "last" command, create /var/log/wtmp: # touch /var/log/wtmp If there are no unsuccessful logins being returned from the "lastb" command, create /var/log/btmp: # touch /var/log/btmp |