STIGQter STIGQter: STIG Summary: Oracle Linux 7 Security Technical Implementation Guide Version: 2 Release: 3 Benchmark Date: 23 Apr 2021:

The Oracle Linux operating system must not permit direct logons to the root account using remote access via SSH.

DISA Rule

SV-221854r603260_rule

Vulnerability Number

V-221854

Group Title

SRG-OS-000480-GPOS-00227

Rule Version

OL07-00-040370

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure SSH to stop users from logging on remotely as the root user.

Edit the appropriate "/etc/ssh/sshd_config" file to uncomment or add the line for the "PermitRootLogin" keyword and set its value to "no" (this file may be named differently or be in a different location if using a version of SSH that is provided by a third-party vendor):

PermitRootLogin no

The SSH service must be restarted for changes to take effect.

Check Contents

Verify remote access using SSH prevents users from logging on directly as root.

Check that SSH prevents users from logging on directly as root with the following command:

# grep -i permitrootlogin /etc/ssh/sshd_config
PermitRootLogin no

If the "PermitRootLogin" keyword is set to "yes", is missing, or is commented out, this is a finding.

Vulnerability Number

V-221854

Documentable

False

Rule Version

OL07-00-040370

Severity Override Guidance

Verify remote access using SSH prevents users from logging on directly as root.

Check that SSH prevents users from logging on directly as root with the following command:

# grep -i permitrootlogin /etc/ssh/sshd_config
PermitRootLogin no

If the "PermitRootLogin" keyword is set to "yes", is missing, or is commented out, this is a finding.

Check Content Reference

M

Target Key

4089

Comments