STIGQter STIGQter: STIG Summary: Red Hat Enterprise Linux 8 Security Technical Implementation Guide Version: 1 Release: 2 Benchmark Date: 23 Apr 2021:

RHEL 8 must display the date and time of the last successful account logon upon an SSH logon.

DISA Rule

SV-230382r627750_rule

Vulnerability Number

V-230382

Group Title

SRG-OS-000480-GPOS-00227

Rule Version

RHEL-08-020350

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure SSH to provide users with feedback on when account accesses last occurred by setting the required configuration options in "/etc/pam.d/sshd" or in the "sshd_config" file used by the system ("/etc/ssh/sshd_config" will be used in the example) (this file may be named differently or be in a different location if using a version of SSH that is provided by a third-party vendor).

Modify the "PrintLastLog" line in "/etc/ssh/sshd_config" to match the following:

PrintLastLog yes

The SSH service must be restarted for changes to "sshd_config" to take effect.

Check Contents

Verify SSH provides users with feedback on when account accesses last occurred with the following command:

$ sudo grep -i printlastlog /etc/ssh/sshd_config

PrintLastLog yes

If the "PrintLastLog" keyword is set to "no", is missing, or is commented out, this is a finding.

Vulnerability Number

V-230382

Documentable

False

Rule Version

RHEL-08-020350

Severity Override Guidance

Verify SSH provides users with feedback on when account accesses last occurred with the following command:

$ sudo grep -i printlastlog /etc/ssh/sshd_config

PrintLastLog yes

If the "PrintLastLog" keyword is set to "no", is missing, or is commented out, this is a finding.

Check Content Reference

M

Target Key

2921

Comments