Check: GEN003320
Solaris 10 X86 STIG:
GEN003320
(in versions v2 r4 through v1 r17)
Title
Default system accounts (with the exception of root) must not be listed in the at.allow file or must be included in the at.deny file if the at.allow file does not exist. (Cat II impact)
Discussion
Default accounts, such as bin, sys, adm, uucp, daemon, and others, should never have access to the at facility. This would create a possible vulnerability open to intruders or malicious users.
Check Content
# more /etc/cron.d/at.allow If default accounts (such as bin, sys, adm, and others) are listed in the at.allow file, this is a finding.
Fix Text
Remove the default accounts (such as bin, sys, adm, and others) from the at.allow file.
Additional Identifiers
Rule ID: SV-227767r603266_rule
Vulnerability ID: V-227767
Group Title: SRG-OS-000480
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000366 |
The organization implements the security configuration settings. |
Controls
Number | Title |
---|---|
CM-6 |
Configuration Settings |