STIGQter STIGQter: STIG Summary: Canonical Ubuntu 16.04 Security Technical Implementation Guide Version: 1 Release: 3 Benchmark Date: 24 Jan 2020: The Ubuntu operating system must display the date and time of the last successful account logon upon logon.

DISA Rule

SV-90177r1_rule

Vulnerability Number

V-75497

Group Title

SRG-OS-000480-GPOS-00227

Rule Version

UBTU-16-010340

Severity

CAT III

CCI(s)

Weight

10

Fix Recommendation

Configure the Ubuntu operating system to provide users with feedback on when account accesses last occurred by setting the required configuration options in "/etc/pam.d/postlogin-ac".

Add the following line to the top of "/etc/pam.d/login":

session required pam_lastlog.so showfailed

Check Contents

Verify users are provided with feedback on when account accesses last occurred.

Check that "pam_lastlog" is used and not silent with the following command:

# grep pam_lastlog /etc/pam.d/login

session required pam_lastlog.so showfailed

If "pam_lastlog" is missing from "/etc/pam.d/login" file, or the "silent" option is present, this is a finding.

Vulnerability Number

V-75497

Documentable

False

Rule Version

UBTU-16-010340

Severity Override Guidance

Verify users are provided with feedback on when account accesses last occurred.

Check that "pam_lastlog" is used and not silent with the following command:

# grep pam_lastlog /etc/pam.d/login

session required pam_lastlog.so showfailed

If "pam_lastlog" is missing from "/etc/pam.d/login" file, or the "silent" option is present, this is a finding.

Check Content Reference

M

Target Key

3075

Comments