GEN001120 - The system must not permit root logins using remote access programs such as SSH.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Even though communications are encrypted, an additional layer of security may be gained by extending the policy of not logging directly on as root. In addition, logging in with a user-specific account preserves the audit trail.

Solution

Edit the configuration file and set the PermitRootLogin option to no.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_SOL_10_x86_V2R2_STIG.zip

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-17(4), CAT|II, CCI|CCI-000770, Rule-ID|SV-227609r603266_rule, STIG-ID|GEN001120, STIG-Legacy|SV-39811, STIG-Legacy|V-1047, Vuln-ID|V-227609

Plugin: Unix

Control ID: cde42b890399670ac8d1358df8f1298fa887f89fbf340e7e6c17d1c3f715ee03