RHEL-06-000029 - Default operating system accounts, other than root, must be locked.

Information

Disabling authentication for default system accounts makes it more difficult for attackers to make use of them to compromise a system.

Solution

Some accounts are not associated with a human user of the system, and exist to perform some administrative function. An attacker should not be able to log into these accounts.

Disable logon access to these accounts with the command:

# passwd -l [SYSACCT]

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_RHEL_6_V2R2_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|II, CCI|CCI-000366, Rule-ID|SV-217867r603264_rule, STIG-ID|RHEL-06-000029, STIG-Legacy|SV-50297, STIG-Legacy|V-38496, Vuln-ID|V-217867

Plugin: Unix

Control ID: 4d564c02dfb72c9a5c593b0d60705c7e39d01a2f8eb996b691735b65a9c3360b