Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-258070 | RHEL-09-412045 | SV-258070r958388_rule | Medium |
Description |
---|
Without auditing of these events, it may be harder or impossible to identify what an attacker did after an attack. |
STIG | Date |
---|---|
Red Hat Enterprise Linux 9 Security Technical Implementation Guide | 2024-06-04 |
Check Text ( C-61811r926195_chk ) |
---|
Verify the "/etc/security/faillock.conf" file is configured to log username information when unsuccessful logon attempts occur with the following command: $ grep audit /etc/security/faillock.conf audit If the "audit" option is not set, is missing, or is commented out, this is a finding. |
Fix Text (F-61735r926196_fix) |
---|
Configure RHEL 9 to log username information when unsuccessful logon attempts occur. Add/modify the "/etc/security/faillock.conf" file to match the following line: audit |