Security Issues
Remote access to NIS maps can be controlled through /etc/ypserv.securenets on host/network basis.
Access to portmap can be controlled through tcp_wrappers
(hosts.deny and hosts.allow files) and/or firewall (access
to tcp/111).
However, a rogue user on a NIS client can quiry the server NIS maps
testu:$1$F3wWFCHd$oYiPPoWXGbe/XVBTG7zFx/:1001:100::/home/testu:/bin/bash
mike:$2$i3r.kJDZ$RlrAtz5tgwDin25c9krZW0:1000:1000::/home/mike:/bin/bash
Then get the password hashes and run crack tools on them.
Sensitive information shouldn't be stored in NIS maps.
Secure alternatives for centralized authentication: LDAP and Kerberos.