GEN001020 - The root account must not be used for direct logins - configured

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Direct login with the root account prevents individual user accountability. Acceptable non-routine uses of the root account for direct login are limited to emergency maintenance, the use of single-user mode for maintenance, and situations where individual administrator accounts are not available.

Solution

Convert the root user into a role.
# usermod -K type=role root

Add the root role to authorized users' logins.
# usermod -R root <userid>

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_SOL_10_SPARC_V2R2_STIG.zip

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-6(10), CAT|II, CCI|CCI-000770, Rule-ID|SV-226479r603265_rule, STIG-ID|GEN001020, STIG-Legacy|SV-39848, STIG-Legacy|V-11979, Vuln-ID|V-226479

Plugin: Unix

Control ID: 5fe7544345a506b4fbff22cb0e773c217bd500f7ab85b3a4c451ca0165c06d44