Check: SOL-11.1-040360
Solaris 11 SPARC STIG:
SOL-11.1-040360
(in versions v2 r10 through v1 r10)
Title
Direct root account login must not be permitted for SSH access. (Cat II impact)
Discussion
The system should not allow users to log in as the root user directly, as audited actions would be non-attributable to a specific user.
Check Content
Determine if root login is disabled for the SSH service. # grep "^PermitRootLogin" /etc/ssh/sshd_config If the output of this command is not: PermitRootLogin no this is a finding.
Fix Text
The root role is required. Modify the sshd_config file # pfedit /etc/ssh/sshd_config Locate the line containing: PermitRootLogin Change it to: PermitRootLogin no Restart the SSH service. # svcadm restart svc:/network/ssh
Additional Identifiers
Rule ID: SV-216354r603267_rule
Vulnerability ID: V-216354
Group Title: SRG-OS-000480
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000366 |
The organization implements the security configuration settings. |
Controls
Number | Title |
---|---|
CM-6 |
Configuration Settings |