UCF STIG Viewer Logo

The system must prevent the root account from logging in from virtual consoles.


Overview

Finding ID Version Rule ID IA Controls Severity
RHEL-06-000027 RHEL-06-000027 RHEL-06-000027_rule Medium
Description
Preventing direct root login to virtual console devices helps ensure accountability for actions taken on the system using the root account.
STIG Date
Red Hat Enterprise Linux 6 Security Technical Implementation Guide 2013-02-05

Details

Check Text ( C-RHEL-06-000027_chk )
To check for virtual console entries which permit root login, run the following command:

# grep '^vc/[0-9]' /etc/securetty

If any output is returned, then root logins over virtual console devices is permitted.
If root login over virtual console devices is permitted, this is a finding.
Fix Text (F-RHEL-06-000027_fix)
To restrict root logins through the (deprecated) virtual console devices, ensure lines of this form do not appear in "/etc/securetty":

vc/1
vc/2
vc/3
vc/4