GEN000452 - The system must display the date and time of the last successful account login upon login.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Providing users with feedback on when account accesses last occurred facilitates user recognition and reporting of unauthorized account use.

Solution

Implement pam_lastlog, or enable PrintLastLog in the SSH daemon.

To enable pam_lastlog, add a line such as 'session required pam_lastlog.so' to /etc/pam.d/sshd.

To enable PrintLastLog in the SSH daemon, remove any lines disabling this option from /etc/ssh/sshd_config.

See Also

http://iasecontent.disa.mil/stigs/zip/U_RedHat_5_V1R17_STIG.zip

Item Details

References: CAT|III, CCI|CCI-000052, Group-ID|V-22299, Rule-ID|SV-37187r1_rule, STIG-ID|GEN000452

Plugin: Unix

Control ID: e56541d0c60a661c6c630bc87608d48e936a7e53e8deeecba6650a560e9055d8