STIGQter STIGQter: STIG Summary: Red Hat Enterprise Linux 7 Security Technical Implementation Guide Version: 2 Release: 6 Benchmark Date: 24 Jan 2020: The Red Hat Enterprise Linux operating system must be configured so that the root account must be the only account having unrestricted access to the system.

DISA Rule

SV-86629r2_rule

Vulnerability Number

V-72005

Group Title

SRG-OS-000480-GPOS-00227

Rule Version

RHEL-07-020310

Severity

CAT I

CCI(s)

Weight

10

Fix Recommendation

Change the UID of any account on the system, other than root, that has a UID of "0".

If the account is associated with system commands or applications, the UID should be changed to one greater than "0" but less than "1000". Otherwise, assign a UID of greater than "1000" that has not already been assigned.

Check Contents

Check the system for duplicate UID "0" assignments with the following command:

# awk -F: '$3 == 0 {print $1}' /etc/passwd

If any accounts other than root have a UID of "0", this is a finding.

Vulnerability Number

V-72005

Documentable

False

Rule Version

RHEL-07-020310

Severity Override Guidance

Check the system for duplicate UID "0" assignments with the following command:

# awk -F: '$3 == 0 {print $1}' /etc/passwd

If any accounts other than root have a UID of "0", this is a finding.

Check Content Reference

M

Target Key

2777

Comments