Check: GEN000000-HPUX0225
HP-UX 11.31 STIG:
GEN000000-HPUX0225
(in versions v1 r19 through v1 r13)
Title
The system must impose the same restrictions on root passwords that are already applied to non-root users. (Cat II impact)
Discussion
Best practices and standard operating procedures for computing systems include password management. If the root account is allowed to be configured with inadequate password controls, the entire system can be compromised.
Check Content
If the system is configured for Trusted Mode, this check is not applicable. For Standard Mode with Security Extensions (SMSE): Check the /etc/default/security file for the following attribute(s) and attribute values: PASSWORD_POLICY_STRICT=1 # grep "PASSWORD_POLICY_STRICT" /etc/default/security If PASSWORD_POLICY_STRICT=0, then the root user is not subject to the same password restrictions as non-root users, and this is a finding.
Fix Text
If the system is operating in Trusted Mode, no fix is required. For SMSE: Edit the /etc/default/security file and add/modify the following attribute(s) and attribute values: PASSWORD_POLICY_STRICT=1 Save the file before exiting the editor.
Additional Identifiers
Rule ID: SV-65205r2_rule
Vulnerability ID: V-50999
Group Title: GEN000000-HPUX0225
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000366 |
The organization implements the security configuration settings. |
Controls
Number | Title |
---|---|
CM-6 |
Configuration Settings |