HostedDB - Dedicated UNIX Servers

-->
IT Baseline Protection Manual S 2.33 Division of administrator roles under Unix

S 2.33 Division of administrator roles under Unix

Initiation responsibility: Head of IT Section, IT Security Management

Implementation responsibility: Administrators

In most Unix systems, there is only one administrator role (the superuser called root with the user ID (UID) 0). Persons with access to this role have full control over the system. In particular, they can read, modify and delete any file, irrespective of access rights.

The superuser password must only be known to the administrators. Disclosure of that password is to be confined to the cases defined in the pertinent regulations, and must be documented. The super-user log-in root can be additionally protected by applying the two-person rule, e.g. by organisational measures such as a split password. In that case, the password must have an extended minimum length (12 characters or more). It must be ensured that the password, in its full minimum length, will be checked by the system.

For a number of Unix systems, division of responsibilities can be achieved by making use of existing administrator roles. In such cases, those roles must be assumed by different persons.

A number of administration activities can also be carried out without access to the root log-in. Where administrators with such special functions exist, use should be made of this option. Especially in those cases where, for large systems, administration functions have to be assigned to several persons, the risks involved can be reduced by an appropriate division of responsibilities. This can be done in two ways:

To determine which log-ins have Administrator rights, auxiliary programs such as USEIT, cops, tiger should be used regularly to search for log-ins which contain UID 0 in the password file.

Additional controls:


© Copyright by
Bundesamt für Sicherheit in der Informationstechnik
last update:
Januar 2000
home