Information
The operating system must display the date and time of the last successful account logon upon an SSH logon.
Rationale:
Providing users with feedback on when account accesses via SSH last occurred facilitates user recognition and reporting of unauthorized account use.
Solution
Configure SSH to provide users with feedback on when account accesses last occurred by setting the required configuration options in /etc/pam.d/sshd or in the sshd_config file used by the system (/etc/ssh/sshd_config will be used in the example) (this file may be named differently or be in a different location if using a version of SSH that is provided by a third-party vendor).
Modify the PrintLastLog line in /etc/ssh/sshd_config to match the following:
Example: vim /etc/ssh/sshd_config
Add, uncomment or update the following line:
PrintLastLog yes
The SSH service must be restarted for changes to sshd_config to take effect.
# systemctl restart sshd.service
Notes:
This Benchmark recommendation maps to:
Red Hat Enterprise Linux 7 Security Technical Implementation Guide:
Version 2, Release: 3 Benchmark Date: 26 Apr 2019
Vul ID: V-72245
Rule ID: SV-86869r3_rule
STIG ID: RHEL-07-040360
Severity: CAT II