GEN000000-HPUX0220 - The system must impose the same restrictions on root logins that are already applied to non-root users

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Best practices standard operating procedures for computing systems includes account management. If the root account is allowed to be configured without a password, or not configured to lock if there have been no logins to the root account for an organization defined time interval, the entire system can be compromised.

Solution

If the system is operating in Trusted Mode, no fix is required.

For SMSE:
Edit the /etc/default/security file and add/modify the following attribute(s) and attribute values:
LOGIN_POLICY_STRICT=1

Save the file before exiting the editor.

See Also

https://iasecontent.disa.mil/stigs/zip/U_HPUX_11-31_V1R19_STIG.zip

Item Details

Category: IDENTIFICATION AND AUTHENTICATION

References: 800-53|IA-5, CAT|II, CCI|CCI-000366, Rule-ID|SV-52432r2_rule, STIG-ID|GEN000000-HPUX0220, Vuln-ID|V-40445

Plugin: Unix

Control ID: 096ae7a17a163e7c41bd6b62619147b11862c24e9098fa2e779923385e5cc9c8