1.5 Disable Interactive Login

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Preventing the MySQL user from logging in interactively may reduce the impact of a compromised MySQL account. There is also more accountability as accessing the operating system where the MySQL server lies will require the user's own account. Interactive access by the MySQL user is unnecessary and should be disabled.

Solution

Perform the following steps to remediate this setting: Execute one of the following commands in a terminal usermod -s /bin/false usermod -s /sbin/nologin Impact: This setting will prevent the MySQL administrator from interactively logging into the operating system using the MySQL user. Instead, the administrator will need to log in using one's own account.

See Also

https://workbench.cisecurity.org/files/1619