STIGQter STIGQter: STIG Summary: Solaris 10 X86 Security Technical Implementation Guide Version: 2 Release: 2 Benchmark Date: 22 Jan 2021:

The system must restrict the ability to switch to the root user to members of a defined group.

DISA Rule

SV-227596r603266_rule

Vulnerability Number

V-227596

Group Title

SRG-OS-000109

Rule Version

GEN000850

Severity

CAT III

CCI(s)

Weight

10

Fix Recommendation

Convert the root user into a role.
# usermod -K type=role root

Add the root role to authorized users' logins.
# usermod -R root <userid>

Check Contents

Verify the root user is configured as a role, rather than a normal user.
# egrep '^root:' /etc/user_attr
If the returned line does not include "type=role", this is a finding.

Verify at least one local user has been assigned the root role.
# egrep '[:;]roles=[^;]*,?root([,;]|$)' /etc/user_attr
If no lines are returned, no users are permitted to assume the root role, this is a finding.

Vulnerability Number

V-227596

Documentable

False

Rule Version

GEN000850

Severity Override Guidance

Verify the root user is configured as a role, rather than a normal user.
# egrep '^root:' /etc/user_attr
If the returned line does not include "type=role", this is a finding.

Verify at least one local user has been assigned the root role.
# egrep '[:;]roles=[^;]*,?root([,;]|$)' /etc/user_attr
If no lines are returned, no users are permitted to assume the root role, this is a finding.

Check Content Reference

M

Target Key

4061

Comments