Check: GEN003320
Solaris 10 SPARC STIG:
GEN003320
(in versions v2 r4 through v1 r19)
Title
Default system accounts (with the exception of root) must not be listed in the at.allow file or must be included in the at.deny file if the at.allow file does not exist. (Cat II impact)
Discussion
Default accounts, such as bin, sys, adm, uucp, daemon, and others, should never have access to the at facility. This would create a possible vulnerability open to intruders or malicious users.
Check Content
# more /etc/cron.d/at.allow If default accounts (such as bin, sys, adm, and others) are listed in the at.allow file, this is a finding.
Fix Text
Remove the default accounts (such as bin, sys, adm, and others) from the at.allow file.
Additional Identifiers
Rule ID: SV-226862r603265_rule
Vulnerability ID: V-226862
Group Title: SRG-OS-000480
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000366 |
The organization implements the security configuration settings. |
Controls
Number | Title |
---|---|
CM-6 |
Configuration Settings |