GEN001120 - The system must not permit root logins using remote access programs such as SSH.

Information

Even though communications are encrypted, an additional layer of security may be gained by extending the policy of not logging directly on as root. In addition, logging in with a user-specific account preserves the audit trail.

Solution

Edit the configuration file and set the PermitRootLogin option to no.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_SOL_10_x86_V2R4_STIG.zip

Item Details

Category: IDENTIFICATION AND AUTHENTICATION

References: 800-53|IA-2(5), CAT|II, CCI|CCI-000770, Rule-ID|SV-227609r603266_rule, STIG-ID|GEN001120, STIG-Legacy|SV-39811, STIG-Legacy|V-1047, Vuln-ID|V-227609

Plugin: Unix

Control ID: bd0ab1bc73373afe0fcef2c6521a5347d554dc647bc5a46fe31275f4298a02e9