The SUSE operating system must not have unnecessary account capabilities.

Overview

Finding IDVersionRule IDIA ControlsSeverity
V-234875SLES-15-020091SV-234875r991589_ruleCCI-000366medium
Description
Accounts providing no operational purpose provide additional opportunities for system compromise. Therefore all necessary non interactive accounts should not have an interactive shell assigned to them.
STIGDate
SUSE Linux Enterprise Server 15 Security Technical Implementation Guide2025-05-14

Details

Check Text (C-234875r991589_chk)

Verify all non-interactive SUSE operating system accounts do not have an interactive shell assigned to them. Obtain the list of authorized system accounts from the Information System Security Officer (ISSO). Check the system accounts on the system with the following command: > awk -F: '($7 !~ "/sbin/nologin" && $7 !~ "/bin/false"){print $1 ":" $3 ":" $7}' /etc/passwd root:0:/bin/bash nobody:65534:/bin/bash If a non-interactive accounts such as "games" or "nobody" is listed with an interactive shell, this is a finding.

Fix Text (F-38026r618895_fix)

Configure the SUSE operating system so that all non-interactive accounts on the system have no interactive shell assigned to them. Run the following command to disable the interactive shell for a specific non-interactive user account: > sudo usermod --shell /sbin/nologin nobody