STIG ID: RHEL-09-412045 | SRG: SRG-OS-000021-GPOS-00005 | Severity: medium | CCI: | Vulnerability Id: V-258070
Without auditing of these events, it may be harder or impossible to identify what an attacker did after an attack.
Configure RHEL 9 to log username information when unsuccessful logon attempts occur.
Add/modify the "/etc/security/faillock.conf" file to match the following line:
audit
Verify the "/etc/security/faillock.conf" file is configured to log username information when unsuccessful logon attempts occur with the following command:
$ grep audit /etc/security/faillock.conf
audit
If the "audit" option is not set, is missing, or is commented out, this is a finding.