SV-215178r508663_rule
V-215178
SRG-OS-000109-GPOS-00056
AIX7-00-001011
CAT II
10
Direct login to shared or application accounts can be prevented by setting the "rlogin=false" in the accounts stanza of the "/etc/security/user" file.
From the command prompt, run the following command to set "rlogin=false" for a shared account:
# chuser rlogin=false [shared_account]
Obtain a list of Shared/Application/Default/Utility accounts from the ISSO/ISSM.
Shared/Application/Default/Utility accounts can have direct login disabled by setting the "rlogin" parameter to "false" in the user’s stanza of the "/etc/security/user" file.
From the command prompt, run the following command to check if shared account has "rlogin=true":
# lsuser -a rlogin [shared_account]
<shared_account> rlogin=true
If a shared account is configured for "rlogin=true", this is a finding.
V-215178
False
AIX7-00-001011
Obtain a list of Shared/Application/Default/Utility accounts from the ISSO/ISSM.
Shared/Application/Default/Utility accounts can have direct login disabled by setting the "rlogin" parameter to "false" in the user’s stanza of the "/etc/security/user" file.
From the command prompt, run the following command to check if shared account has "rlogin=true":
# lsuser -a rlogin [shared_account]
<shared_account> rlogin=true
If a shared account is configured for "rlogin=true", this is a finding.
M
4012