RHEL-06-000069 - The system must require authentication upon booting into single-user and maintenance modes.

Information

This prevents attackers with physical access from trivially bypassing security on the machine and gaining root access. Such accesses are further prevented by configuring the bootloader password.

Solution

Single-user mode is intended as a system recovery method, providing a single user root access to the system by providing a boot option at startup. By default, no authentication is performed if single-user mode is selected.

To require entry of the root password even if the system is started in single-user mode, add or correct the following line in the file '/etc/sysconfig/init':

SINGLE=/sbin/sulogin

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_RHEL_6_V2R2_STIG.zip

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-3, CAT|II, CCI|CCI-000213, Rule-ID|SV-217905r603264_rule, STIG-ID|RHEL-06-000069, STIG-Legacy|SV-50387, STIG-Legacy|V-38586, Vuln-ID|V-217905

Plugin: Unix

Control ID: abe4b6521f117da56f99cf89c49a46db4dd9e755ae6a75da66ada680005d7049