GEN000452 - The system must display the date and time of the last successful account login upon login.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Providing users with feedback on when account accesses last occurred facilitates user recognition and reporting of unauthorized account use.

Solution

Implement pam_lastlog, or enable PrintLastLog in the SSH daemon.

To enable pam_lastlog, add a line such as 'session required pam_lastlog.so' to /etc/pam.d/sshd.

To enable PrintLastLog in the SSH daemon, remove any lines disabling this option from /etc/ssh/sshd_config.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Oracle_Linux_5_V1R14_STIG.zip

Item Details

References: CAT|III, CCI|CCI-000052, Rule-ID|SV-63373r1_rule, STIG-ID|GEN000452, Vuln-ID|V-22299

Plugin: Unix

Control ID: 9316003dafb35b824a97628f4d38d45c47800e29bf285e3d01ea062d0e648ebe