UCF STIG Viewer Logo

Administrative accounts must not run a web browser, except as needed for local service administration.


Overview

Finding ID Version Rule ID IA Controls Severity
V-4382 GEN004220 SV-45825r1_rule High
Description
If a web browser flaw is exploited while running as a privileged user, the entire system could be compromised. Specific exceptions for local service administration should be documented in site-defined policy. These exceptions may include HTTP(S)-based tools used for the administration of the local system, services, or attached devices. Examples of possible exceptions are HP’s System Management Homepage (SMH), the CUPS administrative interface, and Sun's StorageTek Common Array Manager (CAM) when these services are running on the local system.
STIG Date
SUSE Linux Enterprise Server v11 for System z Security Technical Implementation Guide 2018-09-19

Details

Check Text ( C-43143r1_chk )
Interview the SA to determine if a site-defined policy exists which requires administrative accounts to use web browsers only for local service administration. If a site-defined policy does not exist this is a finding.
Fix Text (F-39212r1_fix)
Enforce a site-defined policy requiring administrative accounts use web browsers only for local service administration.