SV-204396r603261_rule
V-204396
SRG-OS-000028-GPOS-00009
RHEL-07-010060
CAT II
10
Configure the operating system to enable a user's session lock until that user re-establishes access using established identification and authentication procedures.
Create a database to contain the system-wide screensaver settings (if it does not already exist) with the following example:
# touch /etc/dconf/db/local.d/00-screensaver
Edit the "[org/gnome/desktop/screensaver]" section of the database file and add or update the following lines:
# Set this to true to lock the screen when the screensaver activates
lock-enabled=true
Update the system databases:
# dconf update
Users must log out and back in again before the system-wide settings take effect.
Verify the operating system enables a user's session lock until that user re-establishes access using established identification and authentication procedures. The screen program must be installed to lock sessions on the console.
Note: If the system does not have GNOME installed, this requirement is Not Applicable.
Check to see if the screen lock is enabled with the following command:
# grep -i lock-enabled /etc/dconf/db/local.d/*
lock-enabled=true
If the "lock-enabled" setting is missing or is not set to "true", this is a finding.
V-204396
False
RHEL-07-010060
Verify the operating system enables a user's session lock until that user re-establishes access using established identification and authentication procedures. The screen program must be installed to lock sessions on the console.
Note: If the system does not have GNOME installed, this requirement is Not Applicable.
Check to see if the screen lock is enabled with the following command:
# grep -i lock-enabled /etc/dconf/db/local.d/*
lock-enabled=true
If the "lock-enabled" setting is missing or is not set to "true", this is a finding.
M
2899