UCF STIG Viewer Logo

The Network Information System (NIS) protocol must not be used.


Overview

Finding ID Version Rule ID IA Controls Severity
V-227949 GEN006400 SV-227949r603266_rule Medium
Description
Due to numerous security vulnerabilities existing within NIS, it must not be used. Possible alternative directory services are NIS+ and LDAP.
STIG Date
Solaris 10 X86 Security Technical Implementation Guide 2022-09-07

Details

Check Text ( C-30111r490267_chk )
Perform the following to determine if NIS is active on the system.

# ps -ef | egrep '(ypbind|ypserv)'

If NIS is found active on the system, this is a finding.
Fix Text (F-30099r490268_fix)
Disable the use of NIS. Possible replacements are NIS+ and LDAP.