UCF STIG Viewer Logo

TOSS must not allow an unattended or automatic logon to the system.


Overview

Finding ID Version Rule ID IA Controls Severity
V-252945 TOSS-04-010430 SV-252945r824159_rule High
Description
Failure to restrict system access to authenticated users negatively impacts operating system security.
STIG Date
Tri-Lab Operating System Stack (TOSS) 4 Security Technical Implementation Guide 2022-08-29

Details

Check Text ( C-56398r824157_chk )
Verify TOSS does not allow an unattended or automatic logon to the system via a graphical user interface.

Note: This requirement assumes the use of the TOSS default graphical user interface, Gnome Shell. If the system does not have any graphical user interface installed, this requirement is Not Applicable.

Check for the value of the "AutomaticLoginEnable" in the "/etc/gdm/custom.conf" file with the following command:

$ sudo grep -i automaticloginenable /etc/gdm/custom.conf
AutomaticLoginEnable=false

If the value of "AutomaticLoginEnable" is missing or is not set to "false", this is a finding. If it does, this is a finding. Automatic logon as an authorized user allows access to any user with physical access to the operating system.
Fix Text (F-56348r824158_fix)
Configure TOSS to not allow an unattended or automatic logon to the system via a graphical user interface.

Add or edit the line for the "AutomaticLoginEnable" parameter in the [daemon] section of the "/etc/gdm/custom.conf" file to "false":

[daemon]
AutomaticLoginEnable=false