UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The system must prevent the root account from logging in from virtual consoles.


Overview

Finding ID Version Rule ID IA Controls Severity
RHEL-06-000027 RHEL-06-000027 RHEL-06-000027_rule Medium
Description
Preventing direct root login to virtual console devices helps ensure accountability for actions taken on the system using the root account.
STIG Date
Red Hat Enterprise Linux 6 Security Technical Implementation Guide 2013-02-05

Details

Check Text ( C-RHEL-06-000027_chk )
To check for virtual console entries which permit root login, run the following command:

# grep '^vc/[0-9]' /etc/securetty

If any output is returned, then root logins over virtual console devices is permitted.
If root login over virtual console devices is permitted, this is a finding.
Fix Text (F-RHEL-06-000027_fix)
To restrict root logins through the (deprecated) virtual console devices, ensure lines of this form do not appear in "/etc/securetty":

vc/1
vc/2
vc/3
vc/4