UCF STIG Viewer Logo

The vAMI must log all successful login events.


Overview

Finding ID Version Rule ID IA Controls Severity
V-90263 VRAU-VA-000610 SV-100913r1_rule Medium
Description
Logging the access to the application server allows the system administrators to monitor user accounts. By logging successful/unsuccessful logons, the system administrator can determine if an account is compromised (e.g., frequent logons) or is in the process of being compromised (e.g., frequent failed logons) and can take actions to thwart the attack. Logging successful logons can also be used to determine accounts that are no longer in use.
STIG Date
VMW vRealize Automation 7.x vAMI Security Technical Implementation Guide 2018-10-12

Details

Check Text ( C-89955r1_chk )
At the command prompt, execute the following command:

grep quiet_success /etc/pam.d/vami-sfcb

If the command returns any output, this is a finding.
Fix Text (F-97005r1_fix)
Navigate to and open /etc/pam.d/vami-sfcb.

Comment out the line which contains quiet_success