STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 1 hour ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to IBM AIX 7.x Security Technical Implementation Guide

V-215178

CAT II (Medium)

Direct logins to the AIX system must not be permitted to shared accounts, default accounts, application accounts, and utility accounts.

Rule ID

SV-215178r1009531_rule

STIG

IBM AIX 7.x Security Technical Implementation Guide

Version

V3R2

CCIs

CCI-004045CCI-000770

Discussion

Shared accounts (accounts where two or more people log in with the same user identification) do not provide identification and authentication. There is no way to provide for non-repudiation or individual accountability.

Check Content

Obtain a list of Shared/Application/Default/Utility accounts from the ISSO/ISSM.

Shared/Application/Default/Utility accounts can have direct login disabled by setting the "rlogin" parameter to "false" in the user’s stanza of the "/etc/security/user" file. 

From the command prompt, run the following command to check if shared account has "rlogin=true":

# lsuser -a rlogin [shared_account] 
<shared_account> rlogin=true

If a shared account is configured for "rlogin=true", this is a finding.

Fix Text

Direct login to shared or application accounts can be prevented by setting the "rlogin=false" in the accounts stanza of the "/etc/security/user" file.

From the command prompt, run the following command to set "rlogin=false" for a shared account:

# chuser rlogin=false [shared_account]