STIGQter STIGQter: STIG Summary: Canonical Ubuntu 20.04 LTS Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 10 Mar 2021:

The Ubuntu operating system must provision temporary user accounts with an expiration time of 72 hours or less.

DISA Rule

SV-238196r653763_rule

Vulnerability Number

V-238196

Group Title

SRG-OS-000002-GPOS-00002

Rule Version

UBTU-20-010000

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

If a temporary account must be created, configure the system to terminate the account after a 72-hour time period with the following command to set an expiration date on it.

Substitute "system_account_name" with the account to be created.

$ sudo chage -E $(date -d "+3 days" +%F) system_account_name

Check Contents

Verify that the Ubuntu operating system expires temporary user accounts within 72 hours or less.

For every existing temporary account, run the following command to obtain its account expiration information:

$ sudo chage -l system_account_name | grep expires

Password expires : Aug 07, 2019
Account expires : Aug 07, 2019

Verify that each of these accounts has an expiration date set within 72 hours of account creation.

If any temporary account does not expire within 72 hours of that account's creation, this is a finding.

Vulnerability Number

V-238196

Documentable

False

Rule Version

UBTU-20-010000

Severity Override Guidance

Verify that the Ubuntu operating system expires temporary user accounts within 72 hours or less.

For every existing temporary account, run the following command to obtain its account expiration information:

$ sudo chage -l system_account_name | grep expires

Password expires : Aug 07, 2019
Account expires : Aug 07, 2019

Verify that each of these accounts has an expiration date set within 72 hours of account creation.

If any temporary account does not expire within 72 hours of that account's creation, this is a finding.

Check Content Reference

M

Target Key

5318

Comments