5.2.24 Ensure Printlastlog is enabled

Information

The operating system must display the date and time of the last successful account logon upon an SSH logon.

Rationale:

Providing users with feedback on when account accesses via SSH last occurred facilitates user recognition and reporting of unauthorized account use.

Solution

Configure SSH to provide users with feedback on when account accesses last occurred by setting the required configuration options in /etc/pam.d/sshd or in the sshd_config file used by the system (/etc/ssh/sshd_config will be used in the example) (this file may be named differently or be in a different location if using a version of SSH that is provided by a third-party vendor).
Modify the PrintLastLog line in /etc/ssh/sshd_config to match the following:
Example: vim /etc/ssh/sshd_config
Add, uncomment or update the following line:

PrintLastLog yes

The SSH service must be restarted for changes to sshd_config to take effect.

# systemctl restart sshd.service

Notes:

This Benchmark recommendation maps to:

Red Hat Enterprise Linux 7 Security Technical Implementation Guide:

Version 2, Release: 3 Benchmark Date: 26 Apr 2019



Vul ID: V-72245

Rule ID: SV-86869r3_rule

STIG ID: RHEL-07-040360

Severity: CAT II

See Also

https://workbench.cisecurity.org/files/2688

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-9

Plugin: Unix

Control ID: e834eb5a22dfe8f0add4d67c53f6aea2f13db8a2410d48d830d65bc0fd5be5aa