UCF STIG Viewer Logo

Direct root account login must not be permitted for SSH access.


Overview

Finding ID Version Rule ID IA Controls Severity
V-216117 SOL-11.1-040360 SV-216117r603268_rule Medium
Description
The system should not allow users to log in as the root user directly, as audited actions would be non-attributable to a specific user.
STIG Date
Solaris 11 X86 Security Technical Implementation Guide 2021-11-23

Details

Check Text ( C-17355r372733_chk )
Determine if root login is disabled for the SSH service.

# grep "^PermitRootLogin" /etc/ssh/sshd_config

If the output of this command is not:

PermitRootLogin no

this is a finding.
Fix Text (F-17353r372734_fix)
The root role is required.

Modify the sshd_config file

# pfedit /etc/ssh/sshd_config

Locate the line containing:

PermitRootLogin

Change it to:

PermitRootLogin no

Restart the SSH service.

# svcadm restart svc:/network/ssh