UCF STIG Viewer Logo

The system must not have unnecessary accounts.


Overview

Finding ID Version Rule ID IA Controls Severity
V-227568 GEN000290 SV-227568r603266_rule Medium
Description
Accounts providing no operational purpose provide additional opportunities for system compromise. Unnecessary accounts include user accounts for individuals not requiring access to the system and application accounts for applications not installed on the system.
STIG Date
Solaris 10 X86 Security Technical Implementation Guide 2020-12-04

Details

Check Text ( C-36439r602920_chk )
Check the system for unnecessary user accounts.

Procedure:
# more /etc/passwd

Some examples of unnecessary accounts include games, news, gopher, ftp, and lp.

If an unnecessary account is found and its use is not justified and documented with the ISSO, this is a finding.
Fix Text (F-36403r602921_fix)
Remove all unnecessary accounts, such as games, from the /etc/passwd file before connecting a system to the network. Other accounts, such as news and gopher, associated with a service not in use should also be removed.