RHEL 10 must prevent a user from overriding the session lock-delay setting for the graphical user interface.

STIG ID: RHEL-10-700780  |  SRG: SRG-OS-000029-GPOS-00010 |  Severity: medium (CAT II)  |  CCI: CCI-000057,CCI-000060 |  Vulnerability Id: V-281281

Vulnerability Discussion

A session timeout lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinity of the information system but does not log out because of the temporary nature of the absence. Rather than relying on the user to manually lock their operating system session prior to vacating the vicinity, the GNOME desktop can be configured to identify when a user's session has idled and take action to initiate the session lock. Therefore, users should not be allowed to change session settings.

Satisfies: SRG-OS-000029-GPOS-00010, SRG-OS-000031-GPOS-00012

Check

Note: This requirement assumes the use of the RHEL 10 default graphical user interface, the GNOME desktop environment. If the system does not have any graphical user interface installed, this requirement is not applicable.

Verify RHEL 10 prevents a user from overriding settings for the screensaver lock delay with the following command:

$ gsettings writable org.gnome.desktop.screensaver lock-delay
false

If "lock-delay" is writable, and the result is "true", this is a finding.

Fix

Configure RHEL 10 to prevent a user from overriding settings for graphical user interfaces.

Note: The example below is using the database "local" for the system. If the system is using another database in "/etc/dconf/profile/user", the file should be created under the appropriate subdirectory.

Update the "/etc/dconf/db/local.d/locks/session" file to prevent nonprivileged users from modifying the lock-delay setting:

$ sudo vi /etc/dconf/db/local.d/locks/session

/org/gnome/desktop/screensaver/lock-delay

Run the following command to update the database:

$ sudo dconf update