DISA STIGS Viewer

RHEL 9 must log username information when unsuccessful logon attempts occur.

Overview

Finding ID Version Rule ID IA Controls Severity
V-258070 RHEL-09-412045 SV-258070r1045153_rule   Medium
Description
Without auditing of these events, it may be harder or impossible to identify what an attacker did after an attack.
STIG Date
Red Hat Enterprise Linux 9 Security Technical Implementation Guide 2024-12-04

Details

Check Text (C-61811r1045151_chk)
Verify the "/etc/security/faillock.conf" file is configured to log username information when unsuccessful logon attempts occur with the following command:

$ sudo grep audit /etc/security/faillock.conf

audit

If the "audit" option is not set, is missing, or is commented out, this is a finding.
Fix Text (F-61735r1045152_fix)
Configure RHEL 9 to log username information when unsuccessful logon attempts occur.

Enable the feature using the following command:

$ sudo authselect enable-feature with-faillock

Add/modify the "/etc/security/faillock.conf" file to match the following line:

audit