STIGQter STIGQter: STIG Summary: VMware vRealize Operations Manager 6.x SLES Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 28 Sep 2018:

The SLES for vRealize must prevent direct logon into the root account.

DISA Rule

SV-99225r1_rule

Vulnerability Number

V-88575

Group Title

SRG-OS-000109-GPOS-00056

Rule Version

VROM-SL-000685

Severity

CAT I

CCI(s)

Weight

10

Fix Recommendation

Configure SLES for vRealize to prevent direct logins to the root account by performing the following operations:

Add this line to the "/etc/group" file:

admin:x:[UNIQUE_NUMBER]:[USERNAME]

USERNAME is the user you wish to add to the admin group.
UNIQUE_NUMBER is a number entered into the ID field of an entry that is unique to all other IDs in the file.

Comment out the following lines in "/etc/sudoers" file:

Default targetpw
ALL ALL=(ALL) ALL

Under the line in the "/etc/sudoers" file:

root ALL=(ALL) All

Add the following line:

%admin ALL=(ALL) ALL

Run the following command:

# passwd -d root

Check Contents

Verify SLES for vRealize prevents direct logons to the root account by running the following command:

# grep root /etc/shadow | cut -d "":"" -f 2

If the returned message contains any text, this is a finding.

Vulnerability Number

V-88575

Documentable

False

Rule Version

VROM-SL-000685

Severity Override Guidance

Verify SLES for vRealize prevents direct logons to the root account by running the following command:

# grep root /etc/shadow | cut -d "":"" -f 2

If the returned message contains any text, this is a finding.

Check Content Reference

M

Target Key

3461

Comments