SLES-12-010650 - The SUSE operating system root account must be the only account having unrestricted access to the system.

Information

If an account other than root also has a User Identifier (UID) of '0', it has root authority, giving that account unrestricted access to the entire SUSE operating system. Multiple accounts with a UID of '0' afford an opportunity for potential intruders to guess a password for a privileged account.

Solution

Change the UID of any account on the SUSE operating system, other than the root account, that has a UID of '0'.

If the account is associated with system commands or applications, the UID should be changed to one greater than '0' but less than '1000'. Otherwise, assign a UID of greater than '1000' that has not already been assigned.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_SLES_12_V3R2_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|I, CCI|CCI-000366, Rule-ID|SV-217164r991589_rule, STIG-ID|SLES-12-010650, STIG-Legacy|SV-91875, STIG-Legacy|V-77179, Vuln-ID|V-217164

Plugin: Unix

Control ID: 51154a279256f49983ba3a87b11a5d9c597dd8b9c04851c7b7154d72e9eab572