6.2.20 Ensure shadow group is empty

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

The shadow group allows system programs which require access the ability to read the /etc/shadow file. No users should be assigned to the shadow group. Any users assigned to the shadow group would be granted read access to the /etc/shadow file. If attackers can gain read access to the /etc/shadow file, they can easily run a password cracking program against the hashed passwords to break them. Other security information that is stored in the /etc/shadow file (such as expiration) could also be useful to subvert additional user accounts.

Solution

Remove all users from the shadow group, and change the primary group of any users with shadow as their primary group.

See Also

https://benchmarks.cisecurity.org/tools2/linux/CIS_Ubuntu_Linux_14.04_LTS_Benchmark_v2.0.0.pdf

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-2

Plugin: Unix

Control ID: a5cc997e15c15691ca4193cf0451f4a6f5bb841d793200bacc032e67291c447f