RHEL-09-411105 - RHEL 9 must ensure account lockouts persist.

Information

Having lockouts persist across reboots ensures that account is only unlocked by an administrator. If the lockouts did not persist across reboots, an attacker could simply reboot the system to continue brute force attacks against the accounts on the system.

Solution

Configure RHEL 9 maintain the contents of the faillock directory after a reboot.

Add/modify the '/etc/security/faillock.conf' file to match the following line:

dir = /var/log/faillock

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_RHEL_9_V1R3_STIG.zip

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-7a., CAT|II, CCI|CCI-000044, Rule-ID|SV-258060r926167_rule, STIG-ID|RHEL-09-411105, Vuln-ID|V-258060

Plugin: Unix

Control ID: bf1dd54936009c22dd2e04fd044e1c88ef3141c0ac421341d6b46e2eeeef1d09