SOL-11.1-080140 - The system must require authentication before allowing modification of the boot devices or menus. Secure the GRUB Menu (Intel).

Information

The flexibility that GRUB provides creates a security risk if its configuration is modified by an unauthorized user. The failsafe menu entry needs to be secured in the same environments that require securing the systems firmware to avoid unauthorized removable media boots.

Solution

The root role is required.

This action applies to the global zone only. Determine the zone that you are currently securing.

# zonename

If the command output is 'global', this action applies.

Update GRUB to use a custom configuration file.

# pfedit /rpool/boot/grub/grub.cfg
Insert the line:
source $prefix/custom.cfg

Create a password hash.

# /usr/lib/grub2/bios/bin/grub-mkpasswd-pbkdf2
Enter password:
Reenter password:
Your PBKDF2 is .......
Copy the long password hash in its entirety.

# pfedit /rpool/boot/grub/custom.cfg
Insert the lines:
set superusers='[username]'
password_pbkdf2 [username] [password hash]

Restart the system.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_SOL_11_x86_V3R1_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|III, CCI|CCI-000366, Rule-ID|SV-216218r959010_rule, STIG-ID|SOL-11.1-080140, STIG-Legacy|SV-60873, STIG-Legacy|V-48001, Vuln-ID|V-216218

Plugin: Unix

Control ID: fab45ddc970c215ab2c4d934ecd306cd14fc566aee57dee6592a62e0bd712421