The Red Hat Enterprise Linux operating system must not allow an unattended or automatic logon to the system via a graphical user interface.

STIG ID: RHEL-07-010440  |  SRG: SRG-OS-000480-GPOS-00229 | Severity: high |  CCI: CCI-000366

Vulnerability Discussion

Failure to restrict system access to authenticated users negatively impacts operating system security.

Check

Verify the operating system does not allow an unattended or automatic logon to the system via a graphical user interface.

Note: If the system does not have GNOME installed, this requirement is Not Applicable.

Check for the value of the "AutomaticLoginEnable" in the "/etc/gdm/custom.conf" file with the following command:

# grep -i automaticloginenable /etc/gdm/custom.conf
AutomaticLoginEnable=false

If the value of "AutomaticLoginEnable" is not set to "false", this is a finding.

Fix

Configure the operating system to not allow an unattended or automatic logon to the system via a graphical user interface.

Note: If the system does not have GNOME installed, this requirement is Not Applicable.

Add or edit the line for the "AutomaticLoginEnable" parameter in the [daemon] section of the "/etc/gdm/custom.conf" file to "false":

[daemon]
AutomaticLoginEnable=false