UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The system must display the date and time of the last successful account logon upon logon.


Overview

Finding ID Version Rule ID IA Controls Severity
V-72275 RHEL-07-040530 SV-86899r2_rule Low
Description
Providing users with feedback on when account accesses last occurred facilitates user recognition and reporting of unauthorized account use.
STIG Date
Red Hat Enterprise Linux 7 Security Technical Implementation Guide 2017-12-14

Details

Check Text ( C-72509r2_chk )
Verify users are provided with feedback on when account accesses last occurred.

Check that "pam_lastlog" is used and not silent with the following command:

# grep pam_lastlog /etc/pam.d/postlogin-ac
session required pam_lastlog.so showfailed

If the "silent" option is present with "pam_lastlog" check the sshd configuration file.

# grep -i printlastlog /etc/ssh/sshd_config
PrintLastLog yes

If "pam_lastlog" is missing from "/etc/pam.d/postlogin-ac" file, or the silent option is present and PrintLastLog is missing from or set to "no" in the "/etc/ssh/sshd_config" file this is a finding.
Fix Text (F-78629r1_fix)
Configure the operating system to provide users with feedback on when account accesses last occurred by setting the required configuration options in "/etc/pam.d/postlogin-ac".

Add the following line to the top of "/etc/pam.d/postlogin-ac":

session required pam_lastlog.so showfailed