UCF STIG Viewer Logo

Administrators must be the only users allowed access to the directory tree, the shell, or other operating system functions and utilities.


Overview

Finding ID Version Rule ID IA Controls Severity
V-2247 WG200 A22 SV-36456r1_rule ECLP-1 High
Description
As a rule, accounts on a web server are to be kept to a minimum. Only administrators, web managers, developers, auditors, and web authors require accounts on the machine hosting the web server. This is in addition to the anonymous web user account. The resources to which these accounts have access must also be closely monitored and controlled. Only the SA needs access to all the system’s capabilities, while the web administrator and associated staff require access and control of the web content and web server configuration files. The anonymous web user account must not have access to system resources as that account could then control the server.
STIG Date
APACHE SITE 2.2 for Unix 2013-04-11

Details

Check Text ( C-29918r1_chk )
Use the command more /etc/passwd to get a list of accounts. Examine the list of user accounts, noting any privileged UIDs (0 to 100) or GIDs (0 to 100). Also, examine their shells to see if they are /etc/bin or /etc/sbin.

Verify with the system administrator or the IAO that all privileged accounts are mission essential and documented.

Verify with the system administrator or the IAO that all non-administrator access to shell scripts and operating system functions are mission essential and documented.

If undocumented privileged IDs are found, this is a finding.

If undocumented access to shell scripts or operating system functions is found, this is a finding.
Fix Text (F-26806r1_fix)
Ensure non-administrators are not allowed access to the directory tree, the shell, or other operating system functions and utilities.