Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-4298 | GEN001000 | SV-37376r1_rule | ECSC-1 | Medium |
Description |
---|
The remote console feature provides an additional means of access to the system which could allow unauthorized access if not disabled or properly secured. With virtualization technologies, remote console access is essential as there is no physical console for virtual machines. Remote console access must be protected in the same manner as any other remote privileged access method. |
STIG | Date |
---|---|
Red Hat Enterprise Linux 5 Security Technical Implementation Guide | 2015-03-12 |
Check Text ( C-36063r1_chk ) |
---|
Check /etc/securetty # more /etc/securetty If the file does not exist, or contains more than "console" or a single "tty" device this is a finding. |
Fix Text (F-31307r1_fix) |
---|
Create if needed and set the contents of /etc/securetty to a "console" or "tty" device. # echo console > /etc/securetty or # echo tty1 > /etc/securetty |