Details
The list of accounts used to connect to remote storage should be reviewed. The account names are visible to anyone who can log into the host.
This security hardening control applies to the following category of controls within NIST 800-53: Access Control.This control applies to the following type of system Unix.