RHEL-09-411035 - RHEL 9 system accounts must not have an interactive login shell.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Ensuring shells are not given to system accounts upon login makes it more difficult for attackers to make use of system accounts.

NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.

Solution

Configure RHEL 9 so that all noninteractive accounts on the system do not have an interactive shell assigned to them.

If the system account needs a shell assigned for mission operations, document the need with the information system security officer (ISSO).

Run the following command to disable the interactive shell for a specific noninteractive user account:

Replace <user> with the user that has a login shell.

$ sudo usermod --shell /sbin/nologin <user>

Do not perform the steps in this section on the root account. Doing so will cause the system to become inaccessible.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_RHEL_9_V1R3_STIG.zip

Item Details

References: CAT|II, CCI|CCI-000366, Rule-ID|SV-258046r926125_rule, STIG-ID|RHEL-09-411035, Vuln-ID|V-258046

Plugin: Unix

Control ID: 6e670caca6f98e3b69148ba3569922b028885bd6a9ab09e6aba3509a1fcb7250