GEN001020 - The root account must not be used for direct logins - configured

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Direct login with the root account prevents individual user accountability. Acceptable non-routine uses of the root account for direct login are limited to emergency maintenance, the use of single-user mode for maintenance, and situations where individual administrator accounts are not available.

Solution

Convert the root user into a role.
# usermod -K type=role root

Add the root role to authorized users' logins.
# usermod -R root <userid>

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_SOL_10_x86_V2R2_STIG.zip

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-6(10), CAT|II, CCI|CCI-000770, Rule-ID|SV-227605r603266_rule, STIG-ID|GEN001020, STIG-Legacy|SV-39848, STIG-Legacy|V-11979, Vuln-ID|V-227605

Plugin: Unix

Control ID: 88c331850b31489b3e5582a2814ad032b0bae8dbed7be732ae392fd0d30fcee8