ALMA-09-024990 - AlmaLinux OS 9 system accounts must not have an interactive login shell.

Information

Ensuring shells are not given to system accounts upon login makes it more difficult for attackers to make use of system accounts.

NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.

Solution

Configure AlmaLinux OS 9 so that all noninteractive accounts on the system do not have an interactive shell assigned to them.

If the system account needs a shell assigned for mission operations, document the need with the ISSO.

Run the following command to disable the interactive shell for a specific noninteractive user account, replacing <user> with the user that has a login shell.

$ usermod --shell /sbin/nologin <user>

Do not perform the steps in this section on the root account. Doing so will cause the system to become inaccessible.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_CL_AlmaLinux_OS_9_V1R5_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|II, CCI|CCI-000366, Rule-ID|SV-269300r1050182_rule, STIG-ID|ALMA-09-024990, Vuln-ID|V-269300

Plugin: Unix

Control ID: b142eff3571be5cf36bb84a5824f8df90418f6b65bc4b67e2ac64b81d350d78c