GEN004220 - Administrative accounts must not run a web browser, except as needed for local service administration.

Information

If a web browser flaw is exploited while running as a privileged user, the entire system could be compromised.

Specific exceptions for local service administration should be documented in site-defined policy. These exceptions may include HTTP(S)-based tools used for the administration of the local system, services, or attached devices. Examples of possible exceptions are HP's System Management Homepage (SMH), the CUPS administrative interface, and Sun's StorageTek Common Array Manager (CAM) when these services are running on the local system.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Enforce policy requiring administrative accounts use web browsers only for local service administration.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Oracle_Linux_5_V2R1_STIG.zip

Item Details

Category: ACCESS CONTROL, CONFIGURATION MANAGEMENT

References: 800-53|AC-6, 800-53|CM-6b., CAT|I, CCI|CCI-000225, CCI|CCI-000366, Rule-ID|SV-218530r603259_rule, STIG-ID|GEN004220, STIG-Legacy|SV-63545, STIG-Legacy|V-4382, Vuln-ID|V-218530

Plugin: Unix

Control ID: cc1b15d9b15ffe93126642a5b31158dba6e5eee41e8e21c56c8becd6204c7287