RHEL-06-000028 - The system must prevent the root account from logging in from serial consoles.

Information

Preventing direct root login to serial port interfaces helps ensure accountability for actions taken on the systems using the root account.

Solution

To restrict root logins on serial ports, ensure lines of this form do not appear in '/etc/securetty':

ttyS0
ttyS1

Note: Serial port entries are not limited to those listed above. Any lines starting with 'ttyS' followed by numerals should be removed

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_RHEL_6_V2R2_STIG.zip

Item Details

Category: IDENTIFICATION AND AUTHENTICATION

References: 800-53|IA-2(5), CAT|III, CCI|CCI-000770, Rule-ID|SV-217866r603264_rule, STIG-ID|RHEL-06-000028, STIG-Legacy|SV-50295, STIG-Legacy|V-38494, Vuln-ID|V-217866

Plugin: Unix

Control ID: 393dd3cb4dc6541e7a354bb402bc3d507988b0219ea888f6c6cf91babce1304a