|Finding ID||Version||Rule ID||IA Controls||Severity|
|When accounts used for web server features such as documentation, sample code, example applications, tutorials, utilities, and services are created even though the feature is not installed, they become an exploitable threat to a web server. These accounts become inactive, are not monitored through regular use, and passwords for the accounts are not created or updated. An attacker, through very little effort, can use these accounts to gain access to the web server and begin investigating ways to elevate the account privileges. The accounts used for web server features not installed must not be created and must be deleted when these features are uninstalled. Satisfies: SRG-APP-000141-WSR-000078, SRG-APP-000211-WSR-000031, SRG-APP-000380-WSR-000072|
|Apache Server 2.4 Windows Server Security Technical Implementation Guide||2022-12-14|
|Check Text ( C-15534r277469_chk )|
| Obtain a list of the user accounts for the system, noting the privileges for each account. |
Verify with the System Administrator (SA) or the Information System Security Officer (ISSO) that all privileged accounts are mission essential and documented.
Verify with the SA or the ISSO that all non-administrator access to shell scripts and operating system functions are mission essential and documented.
If undocumented privileged accounts are present, this is a finding.
If undocumented access to shell scripts or operating system functions is present, this is a finding.
|Fix Text (F-15532r277470_fix)|
|Ensure non-administrators are not allowed access to the directory tree, the shell, or other operating system functions and utilities.|