Groups assigned to users must exist in the /etc/group file.
Overview
Finding ID
Version
Rule ID
IA Controls
Severity
V-216185
SOL-11.1-070060
SV-216185r959010_rule
Medium
Description
Groups defined in passwd but not in group file pose a threat to system security since group permissions are not properly managed.
Details
Check Text (C-17423r372937_chk)
The root role is required.
Check that groups are configured correctly.
# logins -xo | awk -F: '($3 == "") { print $1 }'
If output is produced, this is a finding.
Fix Text (F-17421r372938_fix)
The root role is required.
Correct or justify any items discovered in the Audit step. Determine if any groups are in passwd but not in group, and work with those users or group owners to determine the best course of action in accordance with site policy.
A comprehensive tool for accessing, analyzing, and implementing
Defense Information Systems Agency (DISA) Security Technical
Implementation Guides (STIGs).
Featured Partners
Web page built by Cyber Protection Services. To learn more about our services, click here .
© 2025 DISA STIGS Viewer. All rights reserved.