GEN001475 - The /etc/group file must not contain any group password hashes.

Information

Group passwords are typically shared and should not be used. Additionally, if password hashes are readable by non-administrators, the passwords are subject to attack through lookup tables or cryptographic weaknesses in the hashes.

Solution

Edit /etc/group and change the password field to an exclamation point (!) to lock the group password.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_SOL_10_SPARC_V2R4_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|II, CCI|CCI-000366, Rule-ID|SV-226529r603265_rule, STIG-ID|GEN001475, STIG-Legacy|SV-26447, STIG-Legacy|V-22348, Vuln-ID|V-226529

Plugin: Unix

Control ID: 0040aa69c9b6cd8fce238efd5a8883634f1974507c5f5aec5fba10ccfa800f5b