From SOLARIS 10 X86 SECURITY TECHNICAL IMPLEMENTATION GUIDE
Part of GEN002120
Associated with IA controls: ECSC-1
Associated with: CCI-000366
The shells file (or equivalent) lists approved default shells. It helps provide layered defense to the security approach by ensuring users cannot change their default shell to an unauthorized shell that may not be secure.
Verify /etc/shells exists. # ls -l /etc/shells If the file does not exist, this is a finding.
Create a /etc/shells file containing a list of valid system shells.  The list below contains the default shells from the shells(4) man page.
Procedure (the command is 24 lines long):
cat >/etc/shells < 
	Lavender hyperlinks in small type off to the right (of CSS
	class  
	You can obtain data about documents and items in other
	formats. Simply provide an HTTP header  Powered by sagemincerPro Tips
    id, if you view the page source) point to
	globally unique URIs for each document and item. Copy the
	link location and paste anywhere you need to talk
	unambiguously about these things.
	
      Accept:
	text/turtle or
	Accept: application/rdf+xml.