STIGQter STIGQter: STIG Summary: Canonical Ubuntu 20.04 LTS Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 10 Mar 2021:

The Ubuntu operating system must display the date and time of the last successful account logon upon logon.

DISA Rule

SV-238373r654294_rule

Vulnerability Number

V-238373

Group Title

SRG-OS-000480-GPOS-00227

Rule Version

UBTU-20-010453

Severity

CAT III

CCI(s)

Weight

10

Fix Recommendation

Configure the Ubuntu operating system to provide users with feedback on when account accesses last occurred by setting the required configuration options in "/etc/pam.d/login".

Add the following line to the top of "/etc/pam.d/login":

session required pam_lastlog.so showfailed

Check Contents

Verify users are provided with feedback on when account accesses last occurred.

Check that "pam_lastlog" is used and not silent with the following command:

$ grep pam_lastlog /etc/pam.d/login

session required pam_lastlog.so showfailed

If "pam_lastlog" is missing from "/etc/pam.d/login" file, is not "required", or the "silent" option is present, this is a finding.

Vulnerability Number

V-238373

Documentable

False

Rule Version

UBTU-20-010453

Severity Override Guidance

Verify users are provided with feedback on when account accesses last occurred.

Check that "pam_lastlog" is used and not silent with the following command:

$ grep pam_lastlog /etc/pam.d/login

session required pam_lastlog.so showfailed

If "pam_lastlog" is missing from "/etc/pam.d/login" file, is not "required", or the "silent" option is present, this is a finding.

Check Content Reference

M

Target Key

5318

Comments