RHEL-06-000507 - The operating system, upon successful logon, must display to the user the date and time of the last logon or access via ssh.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Users need to be aware of activity that occurs regarding their account. Providing users with information regarding the date and time of their last successful login allows the user to determine if any unauthorized activity has occurred and gives them an opportunity to notify administrators.

At ssh login, a user must be presented with the last successful login date and time.

Solution

Update the 'PrintLastLog' keyword to 'yes' in /etc/ssh/sshd_config:

PrintLastLog yes

While it is acceptable to remove the keyword entirely since the default action for the SSH daemon is to print the last logon date and time, it is preferred to have the value explicitly documented.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_RHEL_6_V2R1_STIG.zip

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-9, CAT|II, CCI|CCI-000052, Rule-ID|SV-218090r505923_rule, STIG-ID|RHEL-06-000507, STIG-Legacy|SV-50285, STIG-Legacy|V-38484, Vuln-ID|V-218090

Plugin: Unix

Control ID: d1d55c969d793286c696d4afd71a7c2b9078af443f9e6656c93c2794821b447e