GEN001120 - The system must not permit root logins using remote access programs such as ssh.

Information

Even though communications are encrypted, an additional layer of security may be gained by extending the policy of not logging directly on as root. In addition, logging in with a user-specific account preserves the audit trail.

Solution

Edit the sshd_config file and set the PermitRootLogin option to 'no'.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Oracle_Linux_5_V2R1_STIG.zip

Item Details

Category: IDENTIFICATION AND AUTHENTICATION

References: 800-53|IA-2(5), CAT|II, CCI|CCI-000770, Rule-ID|SV-218259r603259_rule, STIG-ID|GEN001120, STIG-Legacy|SV-64455, STIG-Legacy|V-1047, Vuln-ID|V-218259

Plugin: Unix

Control ID: 28b07293c150c65de1cffa8a6befd5ea2205a6b2eb08f444322bc463e074cb56