Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-227767 | GEN003320 | SV-227767r505926_rule | Medium |
Description |
---|
Default accounts, such as bin, sys, adm, uucp, daemon, and others, should never have access to the at facility. This would create a possible vulnerability open to intruders or malicious users. |
STIG | Date |
---|---|
Solaris 10 X86 Security Technical Implementation Guide | 2020-09-04 |
Check Text ( C-29929r488885_chk ) |
---|
# more /etc/cron.d/at.allow If default accounts (such as bin, sys, adm, and others) are listed in the at.allow file, this is a finding. |
Fix Text (F-29917r488886_fix) |
---|
Remove the default accounts (such as bin, sys, adm, and others) from the at.allow file. |