2.2.2.7 Ensure unrestricted logon is not allowed

Information

The operating system must not allow an unrestricted logon to the system.

Rationale:

Failure to restrict system access to authenticated users negatively impacts operating system security.

Solution

Configure the operating system to not allow an unrestricted account to log on to the system via a graphical user interface.
Add or edit the line for the TimedLoginEnable parameter in the [daemon] section of the /etc/gdm/custom.conf file to false:
Example: vim /etc/gdm/custom.conf

[daemon]
TimedLoginEnable=false

Notes:

This Benchmark recommendation maps to:

Red Hat Enterprise Linux 7 Security Technical Implementation Guide:

Version 2, Release: 3 Benchmark Date: 26 Apr 2019



Vul ID: V-71955

Rule ID: SV-86579r3_rule

STIG ID: RHEL-07-010450

Severity: CAT I

See Also

https://workbench.cisecurity.org/files/2688

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b.

Plugin: Unix

Control ID: ad7e18128c80db824fc520b922b8095cb411cafbfcce3d660f7ff0af5b7927df