STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to Oracle Linux 8 Security Technical Implementation Guide

V-248874

CAT I (High)

The root account must be the only account having unrestricted access to the OL 8 system.

Rule ID

SV-248874r991589_rule

STIG

Oracle Linux 8 Security Technical Implementation Guide

Version

V2R8

CCIs

CCI-000366

Discussion

If an account other than root also has a User Identifier (UID) of "0", it has root authority, giving that account unrestricted access to the entire operating system. Multiple accounts with a UID of "0" afford an opportunity for potential intruders to guess a password for a privileged account.

Check Content

Check the system for duplicate UID "0" assignments with the following command: 
 
$ sudo awk -F: '$3 == 0 {print $1}' /etc/passwd 
 
If any accounts other than root have a UID of "0", this is a finding.

Fix Text

Change the UID of any account on the system, other than root, that has a UID of "0". 
 
If the account is associated with system commands or applications, change the UID to one greater than "0" but less than "1000". Otherwise, assign a UID of greater than "1000" that has not already been assigned.