AIX7-00-001030 - AIX system must prevent the root account from directly logging in except from the system console.


Limiting the root account direct logins to only system consoles protects the root account from direct unauthorized access from a non-console device.

A common attack method of potential hackers is to obtain the root password.

To avoid this type of attack, disable direct access to the root ID and then require system administrators to obtain root privileges by using the su - command. In addition to permitting removal of the root user as a point of attack, restricting direct root access permits monitoring which users gained root access, as well as the time of their action. Do this by viewing the /var/adm/sulog file. Another alternative is to enable system auditing, which will report this type of activity.

To disable remote login access for the root user, edit the /etc/security/user file. Specify False as the rlogin value on the entry for root.


From the command prompt, run the following command to set 'rlogin=false' for the root stanza in '/etc/security/user':
# chsec -f /etc/security/user -s root -a rlogin=false

See Also

Item Details


References: 800-53|CM-6b., CAT|II, CCI|CCI-000366, Rule-ID|SV-215189r508663_rule, STIG-ID|AIX7-00-001030, STIG-Legacy|SV-101677, STIG-Legacy|V-91579, Vuln-ID|V-215189

Plugin: Unix

Control ID: 288c58c41a2fe1dc72a1a4f49b274d207d913533f2bc086434675f0a22171cfc