Check: SOL-11.1-040360
Solaris 11 x86 STIG:
SOL-11.1-040360
(in versions v2 r10 through v1 r10)
Title
Direct root account login must not be permitted for SSH access. (Cat II impact)
Discussion
The system should not allow users to log in as the root user directly, as audited actions would be non-attributable to a specific user.
Check Content
Determine if root login is disabled for the SSH service. # grep "^PermitRootLogin" /etc/ssh/sshd_config If the output of this command is not: PermitRootLogin no this is a finding.
Fix Text
The root role is required. Modify the sshd_config file # pfedit /etc/ssh/sshd_config Locate the line containing: PermitRootLogin Change it to: PermitRootLogin no Restart the SSH service. # svcadm restart svc:/network/ssh
Additional Identifiers
Rule ID: SV-216117r603268_rule
Vulnerability ID: V-216117
Group Title: SRG-OS-000480
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000366 |
The organization implements the security configuration settings. |
Controls
Number | Title |
---|---|
CM-6 |
Configuration Settings |