RHEL-06-000319 - The system must limit users to 10 simultaneous system logins, or a site-defined number, in accordance with operational requirements.

Information

Limiting simultaneous user logins can insulate the system from denial of service problems caused by excessive logins. Automated login processes operating improperly or maliciously may result in an exceptional number of simultaneous login sessions.

Solution

Limiting the number of allowed users and sessions per user can limit risks related to denial of service attacks. This addresses concurrent sessions for a single account and does not address concurrent sessions by a single user via multiple accounts. To set the number of concurrent sessions per user add the following line in '/etc/security/limits.conf':

* hard maxlogins 10

A documented site-defined number may be substituted for 10 in the above.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_RHEL_6_V2R2_STIG.zip

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-10, CAT|III, CCI|CCI-000054, Rule-ID|SV-218059r603264_rule, STIG-ID|RHEL-06-000319, STIG-Legacy|SV-50485, STIG-Legacy|V-38684, Vuln-ID|V-218059

Plugin: Unix

Control ID: 3976be93f77e5f70f7d2b51d2959bc33fb1e8dad40b625e666ab5d401387cc7a