Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-38492 | RHEL-06-000027 | SV-50293r1_rule | Medium |
Description |
---|
Preventing direct root login to virtual console devices helps ensure accountability for actions taken on the system using the root account. |
STIG | Date |
---|---|
Red Hat Enterprise Linux 6 Security Technical Implementation Guide | 2018-11-28 |
Check Text ( C-46049r1_chk ) |
---|
To check for virtual console entries which permit root login, run the following command: # grep '^vc/[0-9]' /etc/securetty If any output is returned, then root logins over virtual console devices is permitted. If root login over virtual console devices is permitted, this is a finding. |
Fix Text (F-43439r2_fix) |
---|
To restrict root logins through the (deprecated) virtual console devices, ensure lines of this form do not appear in "/etc/securetty": vc/1 vc/2 vc/3 vc/4 Note: Virtual console entries are not limited to those listed above. Any lines starting with "vc/" followed by numerals should be removed. |