Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-72275 | RHEL-07-040530 | SV-86899r2_rule | Low |
Description |
---|
Providing users with feedback on when account accesses last occurred facilitates user recognition and reporting of unauthorized account use. |
STIG | Date |
---|---|
Red Hat Enterprise Linux 7 Security Technical Implementation Guide | 2017-12-14 |
Check Text ( C-72509r2_chk ) |
---|
Verify users are provided with feedback on when account accesses last occurred. Check that "pam_lastlog" is used and not silent with the following command: # grep pam_lastlog /etc/pam.d/postlogin-ac session required pam_lastlog.so showfailed If the "silent" option is present with "pam_lastlog" check the sshd configuration file. # grep -i printlastlog /etc/ssh/sshd_config PrintLastLog yes If "pam_lastlog" is missing from "/etc/pam.d/postlogin-ac" file, or the silent option is present and PrintLastLog is missing from or set to "no" in the "/etc/ssh/sshd_config" file this is a finding. |
Fix Text (F-78629r1_fix) |
---|
Configure the operating system to provide users with feedback on when account accesses last occurred by setting the required configuration options in "/etc/pam.d/postlogin-ac". Add the following line to the top of "/etc/pam.d/postlogin-ac": session required pam_lastlog.so showfailed |