STIG ID: OL08-00-010150 | SRG: SRG-OS-000080-GPOS-00048 | Severity: high | CCI: | Vulnerability Id: V-248540
If the system does not require valid authentication before it boots into single-user or maintenance mode, anyone who invokes single-user or maintenance mode is granted privileged access to all files on the system. GRUB 2 is the default boot loader for OL 8 and is designed to require a password to boot into single-user mode or modify the boot menu.
Configure the system to require a grub bootloader password for the grub superusers account with the grub2-setpassword command, which creates/overwrites the "/boot/grub2/user.cfg" file.
Generate an encrypted grub2 password for the grub superusers account with the following command:
$ sudo grub2-setpassword
Enter password:
Confirm password:
For systems that use UEFI, this is not applicable.
Determine if an encrypted password is set for the grub superusers account. On systems that use a BIOS, use the following command:
$ sudo grep -iw grub2_password /boot/grub2/user.cfg
GRUB2_PASSWORD=grub.pbkdf2.sha512.[password_hash]
If the grub superusers account password does not begin with "grub.pbkdf2.sha512", this is a finding.