Check: RHEL-06-000319
Red Hat Enterprise Linux 6 STIG:
RHEL-06-000319
(in versions v2 r2 through v1 r14)
Title
The system must limit users to 10 simultaneous system logins, or a site-defined number, in accordance with operational requirements. (Cat III impact)
Discussion
Limiting simultaneous user logins can insulate the system from denial of service problems caused by excessive logins. Automated login processes operating improperly or maliciously may result in an exceptional number of simultaneous login sessions.
Check Content
Run the following command to ensure the "maxlogins" value is configured for all users on the system: $ grep "maxlogins" /etc/security/limits.conf /etc/security/limits.d/*.conf You should receive output similar to the following: * hard maxlogins 10 If it is not similar, this is a finding.
Fix Text
Limiting the number of allowed users and sessions per user can limit risks related to denial of service attacks. This addresses concurrent sessions for a single account and does not address concurrent sessions by a single user via multiple accounts. To set the number of concurrent sessions per user add the following line in "/etc/security/limits.conf": * hard maxlogins 10 A documented site-defined number may be substituted for 10 in the above.
Additional Identifiers
Rule ID: SV-218059r603264_rule
Vulnerability ID: V-218059
Group Title: SRG-OS-000027
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000054 |
The information system limits the number of concurrent sessions for each organization-defined account and/or account type to an organization-defined number of sessions. |
Controls
Number | Title |
---|---|
AC-10 |
Concurrent Session Control |