SV-208806r603263_rule
V-208806
SRG-OS-000480
OL6-00-000029
CAT II
10
Some accounts are not associated with a human user of the system, and exist to perform some administrative function. An attacker should not be able to log into these accounts.
Disable logon access to these accounts with the command:
# passwd -l [SYSACCT]
To obtain a listing of all users and the contents of their shadow password field, run the command:
$ awk -F: '$1 !~ /^root$/ && $2 !~ /^[!*]/ {print $1 ":" $2}' /etc/shadow
Identify the operating system accounts from this listing. These will primarily be the accounts with UID numbers less than 500, other than root. If any default operating system account (other than root) has a valid password hash, this is a finding.
V-208806
False
OL6-00-000029
To obtain a listing of all users and the contents of their shadow password field, run the command:
$ awk -F: '$1 !~ /^root$/ && $2 !~ /^[!*]/ {print $1 ":" $2}' /etc/shadow
Identify the operating system accounts from this listing. These will primarily be the accounts with UID numbers less than 500, other than root. If any default operating system account (other than root) has a valid password hash, this is a finding.
M
2928