RHEL-06-000237 - The system must not permit root logins using remote access programs such as ssh.

Information

Permitting direct root login reduces auditable information about who ran privileged commands on the system and also allows direct attack attempts on root's password.

Solution

The root user should never be allowed to log in to a system directly over a network. To disable root login via SSH, add or correct the following line in '/etc/ssh/sshd_config':

PermitRootLogin no

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_RHEL_6_V2R2_STIG.zip

Item Details

Category: IDENTIFICATION AND AUTHENTICATION

References: 800-53|IA-2(5), CAT|II, CCI|CCI-000770, Rule-ID|SV-218000r603264_rule, STIG-ID|RHEL-06-000237, STIG-Legacy|SV-50414, STIG-Legacy|V-38613, Vuln-ID|V-218000

Plugin: Unix

Control ID: f9efa4921d403efd42e41de86e667e97726e9eed9950a6bfba3cc52450c801ec