Skip to main content
CUI

STIG Rule - V-261357

V-261357

SV-261357r996521_rule

CAT II

SLEM 5 must not have unnecessary accounts.

From: SUSE Linux Enterprise Micro (SLEM) 5 Security Technical Implementation Guide (V1R4)

Description

<VulnDiscussion>Accounts providing no operational purpose provide additional opportunities for system compromise. Unnecessary accounts include user accounts for individuals not requiring access to the system and application accounts for applications not installed on the system.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>

Check Procedure

Verify all SLEM 5 accounts are assigned to an active system, application, or user account with the following command: > more /etc/passwd root:x:0:0:root:/root:/bin/bash ... games:x:12:100:Games account:/var/games:/bin/bash Obtain the list of authorized system accounts from the information system security officer (ISSO). If the accounts on the system do not match the provided documentation, this is a finding.

Fix Text

Configure SLEM 5 so all accounts on the system are assigned to an active system, application, or user account. Remove accounts that do not support approved system activities or that allow for a normal user to perform administrative-level actions. Document all authorized accounts on the system.

CCI Reference

CCI-000366
Created
2026-04-07 20:08:34
Last Updated
2026-04-07 20:08:34
CUI