The root account must be the only account having unrestricted access to RHEL 9 system.
Overview
| Finding ID | Version | Rule ID | IA Controls | Severity |
| V-258059 | RHEL-09-411100 | SV-258059r991589_rule | CCI-000366 | high |
| Description | ||||
| An account has root authority if it has a user identifier (UID) of "0". Multiple accounts with a UID of "0" afford more opportunity for potential intruders to guess a password for a privileged account. Proper configuration of sudo is recommended to afford multiple system administrators access to root privileges in an accountable manner. | ||||
| STIG | Date | |||
| Red Hat Enterprise Linux 9 Security Technical Implementation Guide | 2025-05-14 | |||
Details
Check Text (C-258059r991589_chk)
Verify that only the "root" account has a UID "0" assignment with the following command:
$ awk -F: '$3 == 0 {print $1}' /etc/passwd
root
If any accounts other than "root" have a UID of "0", this is a finding.
Fix Text (F-61724r926163_fix)
Change the UID of any account on the system, other than root, that has a UID of "0".
If the account is associated with system commands or applications, the UID should be changed to one greater than "0" but less than "1000". Otherwise, assign a UID of greater than "1000" that has not already been assigned.