Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-11979 | GEN001020 | SV-39848r1_rule | ECPA-1 | Medium |
Description |
---|
Direct login with the root account prevents individual user accountability. Acceptable non-routine uses of the root account for direct login are limited to emergency maintenance, the use of single-user mode for maintenance, and situations where individual administrator accounts are not available. |
STIG | Date |
---|---|
Solaris 10 SPARC Security Technical Implementation Guide | 2020-02-26 |
Check Text ( C-39531r1_chk ) |
---|
Check if the root is used for direct logins. Procedure: # last root | grep -v reboot If any direct login records for root exist, this is a finding. Verify the root user is configured as a role, rather than a normal user. Procedure: # egrep '^root:' /etc/user_attr If the returned line does not include "type=role", this is a finding. |
Fix Text (F-34665r1_fix) |
---|
Convert the root user into a role. # usermod -K type=role root Add the root role to authorized users' logins. # usermod -R root |