Check: GEN001475
HP-UX 11.31 STIG:
GEN001475
(in versions v1 r19 through v1 r13)
Title
The /etc/group file must not contain any group password hashes. (Cat II impact)
Discussion
Group passwords are typically shared and should not be used. Additionally, if password hashes are readable by non-administrators, the passwords are subject to attack through lookup tables or cryptographic weaknesses in the hashes.
Check Content
Check the /etc/group file for password hashes. # cat /etc/group | cut -f 2,2 -d ":" If the above command returns anything other than a blank or "*" character, this is a finding.
Fix Text
Edit /etc/group and change the password field to include an asterisk (*) as the first character to lock the group password.
Additional Identifiers
Rule ID: SV-38341r1_rule
Vulnerability ID: V-22348
Group Title: GEN001475
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000225 |
The organization employs the concept of least privilege, allowing only authorized accesses for users (and processes acting on behalf of users) which are necessary to accomplish assigned tasks in accordance with organizational missions and business functions. |
Controls
Number | Title |
---|---|
AC-6 |
Least Privilege |