UCF STIG Viewer Logo

The system must prevent the root account from logging in from virtual consoles.


Overview

Finding ID Version Rule ID IA Controls Severity
V-38492 RHEL-06-000027 SV-50293r1_rule Medium
Description
Preventing direct root login to virtual console devices helps ensure accountability for actions taken on the system using the root account.
STIG Date
Red Hat Enterprise Linux 6 Security Technical Implementation Guide 2015-05-26

Details

Check Text ( C-46049r1_chk )
To check for virtual console entries which permit root login, run the following command:

# grep '^vc/[0-9]' /etc/securetty

If any output is returned, then root logins over virtual console devices is permitted.
If root login over virtual console devices is permitted, this is a finding.
Fix Text (F-43439r2_fix)
To restrict root logins through the (deprecated) virtual console devices, ensure lines of this form do not appear in "/etc/securetty":

vc/1
vc/2
vc/3
vc/4

Note: Virtual console entries are not limited to those listed above. Any lines starting with "vc/" followed by numerals should be removed.