DISA STIGS Viewer

RHEL 9 must require a unique superusers name upon booting into single-user and maintenance modes.

Overview

Finding ID Version Rule ID IA Controls Severity
V-257789 RHEL-09-212020 SV-257789r1044841_rule   High
Description
Having a nondefault grub superuser username makes password-guessing attacks less effective.
STIG Date
Red Hat Enterprise Linux 9 Security Technical Implementation Guide 2024-12-04

Details

Check Text (C-61530r1044839_chk)
Verify the boot loader superuser account has been set with the following command:

$ sudo grep -A1 "superusers" /etc/grub2.cfg

set superusers="<accountname>"
export superusers
password_pbkdf2 <accountname> ${GRUB2_PASSWORD}

Verify <accountname> is not a common name such as root, admin, or administrator.

If superusers contains easily guessable usernames, this is a finding.
Fix Text (F-61454r1044840_fix)
Configure RHEL 9 to have a unique username for the grub superuser account.

Edit the "/etc/grub.d/01_users" file and add or modify the following lines with a nondefault username for the superuser account:

set superusers="<accountname>"
export superusers

Once the superuser account has been added, update the grub.cfg file by running:

$ sudo grubby --update-kernel=ALL