UCF STIG Viewer Logo

The system must not have accounts configured with blank or null passwords.


Overview

Finding ID Version Rule ID IA Controls Severity
V-216097 SOL-11.1-040120 SV-216097r603268_rule Medium
Description
Complex passwords can reduce the likelihood of success of automated password-guessing attacks.
STIG Date
Solaris 11 X86 Security Technical Implementation Guide 2021-11-23

Details

Check Text ( C-17335r372673_chk )
The root role is required.

Determine if accounts with blank or null passwords exist.

# logins -po

If any account is listed, this is a finding.
Fix Text (F-17333r372674_fix)
The root role is required.

Remove, lock, or configure a password for any account with a blank password.

# passwd [username]
or
Use the passwd -l command to lock accounts that are not permitted to execute commands.
or
Use the passwd -N command to set accounts to be non-login.