UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The system must impose the same restrictions on root passwords that are already applied to non-root users.


Overview

Finding ID Version Rule ID IA Controls Severity
V-50999 GEN000000-HPUX0225 SV-65205r2_rule Medium
Description
Best practices and standard operating procedures for computing systems include password management. If the root account is allowed to be configured with inadequate password controls, the entire system can be compromised.
STIG Date
HP-UX 11.31 Security Technical Implementation Guide 2018-03-01

Details

Check Text ( C-53445r2_chk )
If the system is configured for Trusted Mode, this check is not applicable.

For Standard Mode with Security Extensions (SMSE):
Check the /etc/default/security file for the following attribute(s) and attribute values:
PASSWORD_POLICY_STRICT=1
# grep "PASSWORD_POLICY_STRICT" /etc/default/security

If PASSWORD_POLICY_STRICT=0, then the root user is not subject to the same password restrictions as non-root users, and this is a finding.
Fix Text (F-55807r1_fix)
If the system is operating in Trusted Mode, no fix is required.

For SMSE:
Edit the /etc/default/security file and add/modify the following attribute(s) and attribute values:
PASSWORD_POLICY_STRICT=1

Save the file before exiting the editor.