STIGQter STIGQter: STIG Summary: Solaris 10 SPARC Security Technical Implementation Guide Version: 2 Release: 2 Benchmark Date: 22 Jan 2021:

Default system accounts must be disabled or removed.

DISA Rule

SV-226588r603265_rule

Vulnerability Number

V-226588

Group Title

SRG-OS-000095

Rule Version

GEN002640

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Lock the default system account(s).
# passwd -l <user>

Check Contents

Determine if default system accounts (such as, those for sys, bin, uucp, nuucp, daemon, smtp, gdm, lp, nobody) have been disabled.

# cat /etc/shadow

If an account's password field is "*", "*LK*", "NP", or is prefixed with a "!", the account is locked or disabled.

If any default system account is not locked and its use is not justified and documented with the ISSO, this is a finding.

Vulnerability Number

V-226588

Documentable

False

Rule Version

GEN002640

Severity Override Guidance

Determine if default system accounts (such as, those for sys, bin, uucp, nuucp, daemon, smtp, gdm, lp, nobody) have been disabled.

# cat /etc/shadow

If an account's password field is "*", "*LK*", "NP", or is prefixed with a "!", the account is locked or disabled.

If any default system account is not locked and its use is not justified and documented with the ISSO, this is a finding.

Check Content Reference

M

Target Key

4060

Comments