Amazon Linux 2023 must ensure all interactive users have unique User IDs (UIDs).
Overview
| Finding ID | Version | Rule ID | IA Controls | Severity |
| V-274160 | AZLX-23-002485 | SV-274160r1120663_rule | CCI-000764 | medium |
| Description | ||||
| To ensure accountability and prevent unauthenticated access, interactive users must be identified and authenticated to prevent potential misuse and compromise of the system. Satisfies: SRG-OS-000104-GPOS-00051, SRG-OS-000121-GPOS-00062, SRG-OS-000042-GPOS-00020 | ||||
| STIG | Date | |||
| Amazon Linux 2023 Security Technical Implementation Guide | 2026-02-27 | |||
Details
Check Text (C-274160r1120663_chk)
Verify Amazon Linux 2023 contains no duplicate UIDs for interactive users with the following command:
$ sudo awk -F ":" 'list[$3]++{print $1, $3}' /etc/passwd
If output is produced and the accounts listed are interactive user accounts, this is a finding.
Fix Text (F-78156r1120467_fix)
Configure Amazon Linux 2023 to contain no duplicate UIDs for interactive users.
Edit the file "/etc/passwd" and provide each interactive user account that has a duplicate UID with a unique UID.