UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The x86 CTRL-ALT-DELETE key sequence must be disabled.


Overview

Finding ID Version Rule ID IA Controls Severity
V-4342 GEN000000-LNX00580 SV-37327r1_rule ECSC-1 High
Description
Undesirable reboots can occur if the CTRL-ALT-DELETE key sequence is not disabled. Such reboots may cause a loss of data or loss of access to critical information.
STIG Date
Red Hat Enterprise Linux 5 Security Technical Implementation Guide 2014-01-09

Details

Check Text ( C-36030r2_chk )
Verify that reboot using the CTRL-ALT-DELETE key sequence has been disabled by performing:

# grep ctrlaltdel /etc/inittab

If the line returned does not specify "/usr/bin/logger", or is not commented out, this is a finding.
Fix Text (F-31276r1_fix)
Ensure the CTRL-ALT-DELETE key sequence has been disabled and attempts to use the sequence are logged.
In the /etc/inittab file replace:
ca::ctrlaltdel:/sbin/shutdown -t3 -r now
with
ca:nil:ctrlaltdel:/usr/bin/logger -p security.info "Ctrl-Alt-Del was pressed"