GEN000452 - The system must display the date and time of the last successful account login upon login.

Information

Providing users with feedback on when account accesses last occurred facilitates user recognition and reporting of unauthorized account use.

Solution

Implement pam_lastlog, or enable PrintLastLog in the SSH daemon.

To enable pam_lastlog, add a line such as 'session required pam_lastlog.so' to /etc/pam.d/sshd.

To enable PrintLastLog in the SSH daemon, remove any lines disabling this option from /etc/ssh/sshd_config.

See Also

http://iasecontent.disa.mil/stigs/zip/U_RedHat_5_V1R18_STIG.zip

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-9, CAT|III, CCI|CCI-000052, Group-ID|V-22299, Rule-ID|SV-37187r1_rule, STIG-ID|GEN000452, Vuln-ID|V-22299

Plugin: Unix

Control ID: 1755ae81de7ec7f63807b5b9e6a0d0169f29bd05f8c972cc642f997db153b3bf