STIGQter STIGQter: STIG Summary: Solaris 11 SPARC Security Technical Implementation Guide Version: 2 Release: 3 Benchmark Date: 23 Apr 2021:

Users must have a valid home directory assignment.

DISA Rule

SV-216423r603267_rule

Vulnerability Number

V-216423

Group Title

SRG-OS-000480

Rule Version

SOL-11.1-070070

Severity

CAT III

CCI(s)

Weight

10

Fix Recommendation

The root role is required.

Correct or justify any items discovered in the check step. Determine if there exists any users who are in passwd but do not have a home directory, and work with those users to determine the best course of action in accordance with site policy. This generally means deleting the user or creating a valid home directory.

Check Contents

The root role is required.

Determine if each user has a valid home directory.

# logins -xo | while read line; do
user=`echo ${line} | awk -F: '{ print $1 }'`
home=`echo ${line} | awk -F: '{ print $6 }'`
if [ -z "${home}" ]; then
echo ${user}
fi
done

If output is produced, this is a finding.

Vulnerability Number

V-216423

Documentable

False

Rule Version

SOL-11.1-070070

Severity Override Guidance

The root role is required.

Determine if each user has a valid home directory.

# logins -xo | while read line; do
user=`echo ${line} | awk -F: '{ print $1 }'`
home=`echo ${line} | awk -F: '{ print $6 }'`
if [ -z "${home}" ]; then
echo ${user}
fi
done

If output is produced, this is a finding.

Check Content Reference

M

Target Key

4022

Comments