UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

SSMC must prevent nonprivileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures.


Overview

Finding ID Version Rule ID IA Controls Severity
V-255248 SSMC-OS-020080 SV-255248r986301_rule Medium
Description
Preventing nonprivileged users from executing privileged functions mitigates the risk that unauthorized individuals or processes may gain unnecessary access to information or privileges. Privileged functions include, for example, establishing accounts, performing system integrity checks, or administering cryptographic key management activities. Nonprivileged users are individuals that do not possess appropriate authorizations. Circumventing intrusion detection and prevention mechanisms or malicious code protection mechanisms are examples of privileged functions that require protection from nonprivileged users. Satisfies: SRG-OS-000324-GPOS-00125, SRG-OS-000373-GPOS-00157, SRG-OS-000373-GPOS-00158
STIG Date
HPE 3PAR SSMC Operating System Security Technical Implementation Guide 2024-05-30

Details

Check Text ( C-58861r869892_chk )
Verify that SSMC prevents nonprivileged users from executing privileged functions by doing the following:

1. Log on to SSMC appliance as ssmcadmin. Press "X" to escape to general bash shell.

2. Execute the following commands:

$ sudo /ssmc/bin/config_security.sh -o sudo_password -a status

Sudo password is enabled

If the command output does not read "Sudo password is enabled", this is a finding.
Fix Text (F-58805r869893_fix)
Configure SSMC to prevent nonprivileged users from executing privileged functions by doing the following:

1. Log on to SSMC appliance as ssmcadmin. Press "X" to escape to general bash shell.

2. Execute the following command:

$ sudo /ssmc/bin/config_security.sh -o sudo_password -a enable