Check: GEN001475
SUSE Linux Enterprise Server v11 for System z STIG:
GEN001475
(in versions v1 r12 through v1 r9)
Title
The /etc/group file must not contain any group password hashes. (Cat II impact)
Discussion
Group passwords are typically shared and should not be used. Additionally, if password hashes are readable by non-administrators, the passwords are subject to attack through lookup tables or cryptographic weaknesses in the hashes.
Check Content
Check the /etc/group file for password hashes. # cut -d : -f 2 /etc/group | egrep -v '^(x|!)$' If any password hashes are returned, this is a finding.
Fix Text
Edit /etc/group and change the password field to an exclamation point (!) to lock the group password.
Additional Identifiers
Rule ID: SV-45017r1_rule
Vulnerability ID: V-22348
Group Title: GEN001475
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000225 |
The organization employs the concept of least privilege, allowing only authorized accesses for users (and processes acting on behalf of users) which are necessary to accomplish assigned tasks in accordance with organizational missions and business functions. |
Controls
Number | Title |
---|---|
AC-6 |
Least Privilege |