UCF STIG Viewer Logo

The SUSE operating system must not have unnecessary account capabilities.


Overview

Finding ID Version Rule ID IA Controls Severity
V-234875 SLES-15-020091 SV-234875r622137_rule Medium
Description
Accounts providing no operational purpose provide additional opportunities for system compromise. Therefore all necessary non interactive accounts should not have an interactive shell assigned to them.
STIG Date
SUSE Linux Enterprise Server 15 Security Technical Implementation Guide 2021-06-14

Details

Check Text ( C-38063r618894_chk )
Verify all non-interactive SUSE operating system accounts do not have an interactive shell assigned to them.

Obtain the list of authorized system accounts from the Information System Security Officer (ISSO).

Check the system accounts on the system with the following command:

> awk -F: '($7 !~ "/sbin/nologin" && $7 !~ "/bin/false"){print $1 ":" $3 ":" $7}' /etc/passwd
root:0:/bin/bash
nobody:65534:/bin/bash

If a non-interactive accounts such as "games" or "nobody" is listed with an interactive shell, this is a finding.
Fix Text (F-38026r618895_fix)
Configure the SUSE operating system so that all non-interactive accounts on the system have no interactive shell assigned to them.

Run the following command to disable the interactive shell for a specific non-interactive user account:

> sudo usermod --shell /sbin/nologin nobody