STIGQter STIGQter: STIG Summary: Solaris 10 SPARC Security Technical Implementation Guide Version: 2 Release: 2 Benchmark Date: 22 Jan 2021:

The root account must not be used for direct logins.

DISA Rule

SV-226479r603265_rule

Vulnerability Number

V-226479

Group Title

SRG-OS-000109

Rule Version

GEN001020

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Convert the root user into a role.
# usermod -K type=role root

Add the root role to authorized users' logins.
# usermod -R root <userid>

Check Contents

Check if the root is used for direct logins.

Procedure:
# last root | grep -v reboot

If any direct login records for root exist, this is a finding.

Verify the root user is configured as a role, rather than a normal user.

Procedure:
# egrep '^root:' /etc/user_attr

If the returned line does not include "type=role", this is a finding.

Vulnerability Number

V-226479

Documentable

False

Rule Version

GEN001020

Severity Override Guidance

Check if the root is used for direct logins.

Procedure:
# last root | grep -v reboot

If any direct login records for root exist, this is a finding.

Verify the root user is configured as a role, rather than a normal user.

Procedure:
# egrep '^root:' /etc/user_attr

If the returned line does not include "type=role", this is a finding.

Check Content Reference

M

Target Key

4060

Comments