STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 6 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Tri-Lab Operating System Stack (TOSS) 5 Security Technical Implementation Guide

V-282759

CAT I (High)

TOSS 5 must not allow unattended or automatic logon via the graphical user interface.

Rule ID

SV-282759r1201257_rule

STIG

Tri-Lab Operating System Stack (TOSS) 5 Security Technical Implementation Guide

Version

V1R1

CCIs

CCI-000366

Discussion

Failure to restrict system access to authenticated users negatively impacts operating system security.

Check Content

Verify TOSS 5 does not allow an unattended or automatic logon to the system via a graphical user interface.

Note: This requirement assumes the use of the TOSS 5 default graphical user interface, the GNOME desktop environment. If the system does not have any graphical user interface installed, this requirement is not applicable.

Check for the value of the "AutomaticLoginEnable" in the "/etc/gdm/custom.conf" file using the following command:

$ grep -i automaticlogin /etc/gdm/custom.conf

[daemon]
AutomaticLoginEnable=false

If the value of "AutomaticLoginEnable" is not set to "false", this is a finding.

Fix Text

Configure the GNOME desktop display manager to disable automatic login.

Set "AutomaticLoginEnable" to "false" in the [daemon] section in "/etc/gdm/custom.conf". For example:

[daemon]
AutomaticLoginEnable=false