Ensure that no two regular users are
assigned or share the same account. Never give any users the same
UID.
Think about how you can assign group IDs to promote appropriate
sharing and protection without sharing accounts.
Avoid use of the root account for routine
activities that can be done under a plain user ID. Disable root
logins.
Think of how to protect especially sensitive files in the event that
the root account is compromised. This protection
includes use of removable media and encryption.
Restrict access to the /bin/su command, or
restrict the ability to su to user
root. Consider using sudo
instead.
/bin/su to the user's ID when
investigating problem reports rather than exploring as user
root. Always give the full pathname when using
su.
Scan the files /var/log/messages,
/var/adm/sulog, and other appropriate log files
on a regular basis for bad su attempts.
If your system supports kernel security levels or capabilities,
consider using them to restrict what root can do
when the system is running.