STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 6 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to SLES 12 Security Technical Implementation Guide

V-217113

CAT III (Low)

The SUSE operating system must limit the number of concurrent sessions to 10 for all accounts and/or account types.

Rule ID

SV-217113r958398_rule

STIG

SLES 12 Security Technical Implementation Guide

Version

V3R2

CCIs

V-77069

Discussion

SUSE operating system management includes the ability to control the number of users and user sessions that utilize a SUSE operating system. Limiting the number of allowed users and sessions per user is helpful in reducing the risks related to Denial-of-Service (DoS) attacks. This requirement addresses concurrent sessions for information system accounts and does not address concurrent sessions by single users via multiple system accounts. The maximum number of concurrent sessions should be defined based on mission needs and the operational environment for each system.

Check Content

Verify the SUSE operating system limits the number of concurrent sessions to 10 for all accounts and/or account types by running the following command:

# grep "maxlogins" /etc/security/limits.conf /etc/security/limits.d/*.conf

The result must contain the following line:

* hard maxlogins 10

If the "maxlogins" item is missing, the line does not begin with a star symbol, or the value is not set to "10" or less, this is a finding.

Fix Text

Configure the SUSE operating system to limit the number of concurrent sessions to 10 or less for all accounts and/or account types.

Add the following line to "/etc/security/limits.conf" or /etc/security/limits.d/*.conf file:

* hard maxlogins 10