RHEL-09-211050 - The x86 Ctrl-Alt-Delete key sequence must be disabled on RHEL 9.

Information

A locally logged-on user who presses Ctrl-Alt-Delete when at the console can reboot the system. If accidentally pressed, as could happen in the case of a mixed OS environment, this can create the risk of short-term loss of availability of systems due to unintentional reboot. In a graphical user environment, risk of unintentional reboot from the Ctrl-Alt-Delete sequence is reduced because the user will be prompted before any action is taken.

Satisfies: SRG-OS-000324-GPOS-00125, SRG-OS-000480-GPOS-00227

Solution

Configure RHEL 9 to disable the ctrl-alt-del.target with the following command:

$ sudo systemctl disable --now ctrl-alt-del.target
$ sudo systemctl mask --now ctrl-alt-del.target

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_RHEL_9_V2R1_STIG.zip

Item Details

Category: ACCESS CONTROL, CONFIGURATION MANAGEMENT

References: 800-53|AC-6(10), 800-53|CM-6b., CAT|I, CCI|CCI-000366, CCI|CCI-002235, Rule-ID|SV-257785r958726_rule, STIG-ID|RHEL-09-211050, Vuln-ID|V-257785

Plugin: Unix

Control ID: 385e10ebe7675f896076fc6bb2f0318d6bcb6d3ede5c3bb10fa59324aadf539f