Evaluated the status of NIS service daemons on the system. Active NIS services could have permitted unauthorized users to escalate privileges or access sensitive account information, posing a significant security risk.
reference:
- https://isms.kisa.or.kr
tags:linux,local,audit,kisa,compliance
self-contained:true
code:
- engine:
- sh
- bash
source:|
if command -v systemctl >/dev/null 2>&1; then
if systemctl is-active --quiet ypserv ypbind; then