GEN001475 - The /etc/group file must not contain any group password hashes.

Information

Group passwords are typically shared and should not be used. Additionally, if password hashes are readable by non-administrators, the passwords are subject to attack through lookup tables or cryptographic weaknesses in the hashes.

Solution

Edit /etc/group and change the password field to an exclamation point (!) to lock the group password.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_SOL_10_x86_V2R4_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|II, CCI|CCI-000366, Rule-ID|SV-227655r603266_rule, STIG-ID|GEN001475, STIG-Legacy|SV-26447, STIG-Legacy|V-22348, Vuln-ID|V-227655

Plugin: Unix

Control ID: 142b26ce96436dd25d5adc1ed02d9d8ed3293a4c9454d2abb72bbd19c237c7ae