UCF STIG Viewer Logo

The system must display the date and time of the last successful account logon upon logon.


Overview

Finding ID Version Rule ID IA Controls Severity
V-72275 RHEL-07-040530 SV-86899r2_rule Low
Description
Providing users with feedback on when account accesses last occurred facilitates user recognition and reporting of unauthorized account use.
STIG Date
Red Hat Enterprise Linux 7 Security Technical Implementation Guide 2017-12-14

Details

Check Text ( C-72509r2_chk )
Verify users are provided with feedback on when account accesses last occurred.

Check that "pam_lastlog" is used and not silent with the following command:

# grep pam_lastlog /etc/pam.d/postlogin-ac
session required pam_lastlog.so showfailed

If the "silent" option is present with "pam_lastlog" check the sshd configuration file.

# grep -i printlastlog /etc/ssh/sshd_config
PrintLastLog yes

If "pam_lastlog" is missing from "/etc/pam.d/postlogin-ac" file, or the silent option is present and PrintLastLog is missing from or set to "no" in the "/etc/ssh/sshd_config" file this is a finding.
Fix Text (F-78629r1_fix)
Configure the operating system to provide users with feedback on when account accesses last occurred by setting the required configuration options in "/etc/pam.d/postlogin-ac".

Add the following line to the top of "/etc/pam.d/postlogin-ac":

session required pam_lastlog.so showfailed