GEN000000-LNX00600 - The Linux PAM system must not grant sole access to admin privileges to the first user who logs into the console.

Information

If an unauthorized user has been granted privileged access while logged in at the console, the security posture of a system could be greatly compromised. Additionally, such a situation could deny legitimate root access from another terminal.

Solution

Configure PAM to not grant sole access of administrative privileges to the first user logged in at the console.

Identify any instances of pam_console.

# cd /etc/pam.d
# grep pam_console.so *

For any files containing an un-commented reference to pam_console.so, edit the file and remove or comment out the reference.

Remove the console.perms file if it exists:
# rm /etc/security/console.perms

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Oracle_Linux_5_V2R1_STIG.zip

Item Details

Category: ACCESS CONTROL, CONFIGURATION MANAGEMENT

References: 800-53|AC-6, 800-53|CM-6b., CAT|II, CCI|CCI-000225, CCI|CCI-000366, Rule-ID|SV-218181r603259_rule, STIG-ID|GEN000000-LNX00600, STIG-Legacy|SV-63003, STIG-Legacy|V-4346, Vuln-ID|V-218181

Plugin: Unix

Control ID: fa31bcab00cb78c454bcad7393c7e28af1a383133adeb7273482bf1f9658584f