UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The system must prevent the root account from logging in from virtual consoles.


Overview

Finding ID Version Rule ID IA Controls Severity
V-38492 RHEL-06-000027 SV-50293r1_rule Medium
Description
Preventing direct root login to virtual console devices helps ensure accountability for actions taken on the system using the root account.
STIG Date
Red Hat Enterprise Linux 6 Security Technical Implementation Guide 2016-12-16

Details

Check Text ( C-46049r1_chk )
To check for virtual console entries which permit root login, run the following command:

# grep '^vc/[0-9]' /etc/securetty

If any output is returned, then root logins over virtual console devices is permitted.
If root login over virtual console devices is permitted, this is a finding.
Fix Text (F-43439r2_fix)
To restrict root logins through the (deprecated) virtual console devices, ensure lines of this form do not appear in "/etc/securetty":

vc/1
vc/2
vc/3
vc/4

Note: Virtual console entries are not limited to those listed above. Any lines starting with "vc/" followed by numerals should be removed.