RHEL-09-411100 - The root account must be the only account having unrestricted access to RHEL 9 system.

Information

An account has root authority if it has a user identifier (UID) of '0'. Multiple accounts with a UID of '0' afford more opportunity for potential intruders to guess a password for a privileged account. Proper configuration of sudo is recommended to afford multiple system administrators access to root privileges in an accountable manner.

Solution

Change the UID of any account on the system, other than root, that has a UID of '0'.

If the account is associated with system commands or applications, the UID should be changed to one greater than '0' but less than '1000'. Otherwise, assign a UID of greater than '1000' that has not already been assigned.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_RHEL_9_V2R2_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|I, CCI|CCI-000366, Rule-ID|SV-258059r991589_rule, STIG-ID|RHEL-09-411100, Vuln-ID|V-258059

Plugin: Unix

Control ID: 1418d9c36aad4a4ca6958ad639f912685f8c060359e709861f0081c09f0739fe