2.8 Disable NIS Client Services

Information

If the local site is not using the NIS naming service to distribute system and user configuration information, this service may be disabled. This service is disabled by default unless the NIS service has been installed and configured on the system.

Rationale:

As RPC-based services such as NIS may use non-secure authentication and share sensitive network object information with systems and applications using RPC-based service, NIS client daemons should be disabled. Users are encouraged to use LDAP as a name service in place of NIS.

Solution

To disable this service, run the following commands:

# svcadm disable svc:/network/nis/client

Check to see if LDAP Client is in use:

# svcs -a | grep ldap | awk -F' ' '{if ($1 ~ /disabled/ && $3 ~ /client/) print 'LDAP Client is disabled - svc:/network/nfs/domain can be disabled.';}'

If LDAP is not in use also disable nis/domain:

# svcadm disable svc:/network/nis/domain

See Also

https://workbench.cisecurity.org/benchmarks/4777

Item Details

Category: SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|CA-9, 800-53|SC-7, 800-53|SC-7(5), CSCv7|9.2

Plugin: Unix

Control ID: 371d4b01ccb9a30e0040fe2543e061f101eb556b5a082df38950e09065810a38