UCF STIG Viewer Logo

The system must not have the unnecessary games account.


Overview

Finding ID Version Rule ID IA Controls Severity
V-29376 GEN000290-1 SV-63201r1_rule IAAC-1 Medium
Description
Accounts that provide no operational purpose provide additional opportunities for system compromise. Unnecessary accounts include user accounts for individuals not requiring access to the system and application accounts for applications not installed on the system.
STIG Date
Oracle Linux 5 Security Technical Implementation Guide 2015-03-26

Details

Check Text ( C-51927r1_chk )
Check the system for the unnecessary "games" accounts.

Procedure:
# grep ^games /etc/passwd
If this account exists, it is a finding.
Fix Text (F-53781r1_fix)
Remove the "games" account from the /etc/passwd file (using the /usr/sbin/userdel command) before connecting a system to the network.

Procedure:
# userdel games