UCF STIG Viewer Logo

The SUSE operating system must not have unnecessary account capabilities.


Overview

Finding ID Version Rule ID IA Controls Severity
V-237606 SLES-12-010631 SV-237606r646781_rule Medium
Description
Accounts providing no operational purpose provide additional opportunities for system compromise. Therefore all necessary non-interactive accounts should not have an interactive shell assigned to them.
STIG Date
SLES 12 Security Technical Implementation Guide 2022-12-06

Details

Check Text ( C-40825r646779_chk )
Verify all non-interactive SUSE operating system accounts do not have an interactive shell assigned to them.

Obtain the list of authorized system accounts from the Information System Security Officer (ISSO).

Check the system accounts on the system with the following command:

> awk -F: '($7 !~ "/sbin/nologin" && $7 !~ "/bin/false"){print $1 ":" $3 ":" $7}' /etc/passwd
root:0:/bin/bash
nobody:65534:/bin/bash

If a non-interactive accounts such as "games" or "nobody" is listed with an interactive shell, this is a finding.
Fix Text (F-40788r646780_fix)
Configure the SUSE operating system so that all non-interactive accounts on the system have no interactive shell assigned to them.

Run the following command to disable the interactive shell for a specific non-interactive user account:

> sudo usermod --shell /sbin/nologin nobody