Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-4269 | GEN000290 | SV-38176r1_rule | IAAC-1 | Medium |
Description |
---|
Accounts providing no operational purpose provide additional opportunities for system compromise. Unnecessary accounts include user accounts for individuals not requiring access to the system and application accounts for applications not installed on the system. |
STIG | Date |
---|---|
Red Hat Enterprise Linux 5 Security Technical Implementation Guide | 2014-04-02 |
Check Text ( C-37560r2_chk ) |
---|
Check the system for unnecessary user accounts. Procedure: # more /etc/passwd Obtain a list of authorized accounts from the IAO. If any unnecessary accounts are found on the system, this is a finding. |
Fix Text (F-32804r1_fix) |
---|
Remove all unnecessary accounts from the /etc/passwd file before connecting a system to the network. Other accounts that are associated with a service not in use should also be removed. |