AZLX-23-002480 - Amazon Linux 2023 must insure all interactive users have a primary group that exists.

Information

If a user is assigned the group identifier (GID) of a group that does not exist on the system, and a group with the GID is subsequently created, the user may have unintended rights to any files associated with the group.

Satisfies: SRG-OS-000104-GPOS-00051, SRG-OS-000121-GPOS-00062, SRG-OS-000042-GPOS-00020

Solution

Configure Amazon Linux 2023 so that all GIDs are referenced in "/etc/passwd" are defined in "/etc/group".

Edit the file "/etc/passwd" and ensure that every user's GID is a valid GID.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Amazon_Linux_2023_V1R1_STIG.zip

Item Details

Category: AUDIT AND ACCOUNTABILITY, IDENTIFICATION AND AUTHENTICATION

References: 800-53|AU-3(1), 800-53|IA-2, 800-53|IA-8, CAT|II, CCI|CCI-000135, CCI|CCI-000764, CCI|CCI-000804, Rule-ID|SV-274159r1120465_rule, STIG-ID|AZLX-23-002480, Vuln-ID|V-274159

Plugin: Unix

Control ID: 845a71119760f2580f0b8b5246956bb4e30ebefc49e8301605d5926a5eae7903