STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 4 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Tri-Lab Operating System Stack (TOSS) 5 Security Technical Implementation Guide

V-282504

CAT I (High)

TOSS 5 must enable the Pluggable Authentication Module (PAM) interface for SSHD.

Rule ID

SV-282504r1200492_rule

STIG

Tri-Lab Operating System Stack (TOSS) 5 Security Technical Implementation Guide

Version

V1R1

CCIs

CCI-000877

Discussion

When "UsePAM" is set to "yes", PAM runs through account and session types properly. This is important when restricted access to services based off of IP, time, or other factors of the account are needed. Additionally, this ensures users can inherit certain environment variables on login or disallow access to the server.

Check Content

Verify the TOSS 5 SSHD is configured to allow for the "UsePAM" interface using the following command:

$ sudo /usr/sbin/sshd -dd 2>&1 | awk '/filename/ {print $4}' | tr -d '\r' | tr '\n' ' ' | xargs sudo grep -iH '^\s*usepam'

UsePAM yes

If the "UsePAM" keyword is set to "no", is missing, or is commented out, this is a finding.

Fix Text

Configure the TOSS 5 SSHD to use the "UsePAM" interface, by adding or modifying the following line in "/etc/ssh/sshd_config":

UsePAM yes

Restart the SSH daemon for the settings to take effect:

$ sudo systemctl restart sshd.service