STIGQter STIGQter: STIG Summary: Red Hat Enterprise Linux 6 Security Technical Implementation Guide Version: 1 Release: 24 Benchmark Date: 25 Oct 2019: The root account must be the only account having a UID of 0.

DISA Rule

SV-50301r2_rule

Vulnerability Number

V-38500

Group Title

SRG-OS-999999

Rule Version

RHEL-06-000032

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

If any account other than root has a UID of 0, this misconfiguration should be investigated and the accounts other than root should be removed or have their UID changed.

Check Contents

To list all password file entries for accounts with UID 0, run the following command:

# awk -F: '($3 == 0) {print}' /etc/passwd

This should print only one line, for the user root.
If any account other than root has a UID of 0, this is a finding.

Vulnerability Number

V-38500

Documentable

False

Rule Version

RHEL-06-000032

Severity Override Guidance

To list all password file entries for accounts with UID 0, run the following command:

# awk -F: '($3 == 0) {print}' /etc/passwd

This should print only one line, for the user root.
If any account other than root has a UID of 0, this is a finding.

Check Content Reference

M

Target Key

2367

Comments