UBTU-16-010670 - The root account must be the only account having unrestricted access to the system.

Information

If an account other than root also has a User Identifier (UID) of '0', it has root authority, giving that account unrestricted access to the entire Ubuntu operating system. Multiple accounts with a UID of '0' afford an opportunity for potential intruders to guess a password for a privileged account.

Solution

Change the User ID (UID) of any account on the system, other than root, that has a UID of '0'.

If the account is associated with system commands or applications, the UID should be changed to one greater than '0' but less than '1000'. Otherwise, assign a UID of greater than '1000' that has not already been assigned.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_CAN_Ubuntu_16-04_LTS_V2R3_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|I, CCI|CCI-000366, Rule-ID|SV-214999r610931_rule, STIG-ID|UBTU-16-010670, STIG-Legacy|SV-90229, STIG-Legacy|V-75549, Vuln-ID|V-214999

Plugin: Unix

Control ID: 57f27233621b9230341cc1fa10907d8a67329b8fce79c15f23a75d7d5e81886f