STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 4 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to SUSE Linux Enterprise Micro (SLEM) 5 Security Technical Implementation Guide

V-261367

CAT III (Low)

SLEM 5 must limit the number of concurrent sessions to 10 for all accounts and/or account types.

Rule ID

SV-261367r996839_rule

STIG

SUSE Linux Enterprise Micro (SLEM) 5 Security Technical Implementation Guide

Version

V1R4

CCIs

CCI-000054

Discussion

SLEM 5 management includes the ability to control the number of users and user sessions that use a SLEM 5. Limiting the number of allowed users and sessions per user is helpful in reducing the risks related to denial-of-service (DoS) attacks. This requirement addresses concurrent sessions for information system accounts and does not address concurrent sessions by single users via multiple system accounts. The maximum number of concurrent sessions should be defined based on mission needs and the operational environment for each system.

Check Content

Verify SLEM 5 limits the number of concurrent sessions to 10 for all accounts and/or account types with the following command:

     > grep "maxlogins" /etc/security/limits.conf
     * hard maxlogins 10

If the "maxlogins" does not have a value of "10" or less, is commented out, or is missing, this is a finding.

Fix Text

Configure SLEM 5 to limit the number of concurrent sessions to "10" or less for all accounts and/or account types.

Add or modify the following line to the file "/etc/security/limits.conf":

* hard maxlogins 10