RHEL-06-000029 - Default operating system accounts, other than root, must be locked.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Disabling authentication for default system accounts makes it more difficult for attackers to make use of them to compromise a system.

Solution

Some accounts are not associated with a human user of the system, and exist to perform some administrative function. An attacker should not be able to log into these accounts.

Disable logon access to these accounts with the command:

# passwd -l [SYSACCT]

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_RHEL_6_V2R1_STIG.zip

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-3, CAT|II, CCI|CCI-000366, Rule-ID|SV-217867r505923_rule, STIG-ID|RHEL-06-000029, STIG-Legacy|SV-50297, STIG-Legacy|V-38496, Vuln-ID|V-217867

Plugin: Unix

Control ID: 6e0938f54f7fa607ed27e2f6c3589d51baf76a9f446af6b600d510feb7507523