UCF STIG Viewer Logo

The OL 8 system-auth file must disable access to the system for account identifiers (individuals, groups, roles, and devices) with 35 days of inactivity.


Overview

Finding ID Version Rule ID IA Controls Severity
V-248703 OL08-00-020260 SV-248703r779675_rule Medium
Description
Inactive identifiers pose a risk to systems and applications because attackers may exploit an inactive identifier and potentially obtain undetected access to the system. Owners of inactive accounts will not notice if unauthorized access to their user account has been obtained. OL 8 needs to track periods of inactivity and disable application identifiers after 35 days of inactivity.
STIG Date
Oracle Linux 8 Security Technical Implementation Guide 2022-12-06

Details

Check Text ( C-52137r779673_chk )
Verify the account identifiers (individuals, groups, roles, and devices) are disabled after 35 days of inactivity by checking the account inactivity value with the following command:

$ sudo grep 'inactive\|pam_unix' /etc/pam.d/system-auth | grep -w auth

auth required pam_lastlog.so inactive=35
auth sufficient pam_unix.so

If the pam_lastlog.so module is listed below the pam_unix.so module in the "system-auth" file, this is a finding.

If the value of "inactive" is set to zero, a negative number, or is greater than 35, this is a finding.

If the line is commented out or missing, ask the administrator to indicate how the system disables access for account identifiers. If there is no evidence that the system is disabling access for account identifiers after 35 days of inactivity, this is a finding.
Fix Text (F-52091r779674_fix)
Configure OL 8 to disable access to the system for account identifiers with 35 days of inactivity.

Add/Modify the following line to "/etc/pam.d/system-auth" above the "pam_unix.so" statement:

auth required pam_lastlog.so inactive=35

Note: The DoD recommendation is 35 days, but a lower value is acceptable.