GEN000000-HPUX0225 - The system must impose the same restrictions on root passwords that are already applied to non-root users

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Best practices and standard operating procedures for computing systems include password management. If the root account is allowed to be configured with inadequate password controls, the entire system can be compromised.

Solution

If the system is operating in Trusted Mode, no fix is required.

For SMSE:
Edit the /etc/default/security file and add/modify the following attribute(s) and attribute values:
PASSWORD_POLICY_STRICT=1

Save the file before exiting the editor.

See Also

https://iasecontent.disa.mil/stigs/zip/U_HPUX_11-31_V1R19_STIG.zip

Item Details

Category: IDENTIFICATION AND AUTHENTICATION

References: 800-53|IA-5, CAT|II, CCI|CCI-000366, Rule-ID|SV-65205r2_rule, STIG-ID|GEN000000-HPUX0225, Vuln-ID|V-50999

Plugin: Unix

Control ID: fe8619baa03630ead1950e29bba12a40658ead597e62a45fd10e01233d34d6b5