UCF STIG Viewer Logo

Skeleton files must not have extended ACLs.


Overview

Finding ID Version Rule ID IA Controls Severity
V-22357 GEN001810 SV-38736r1_rule ECLP-1 Medium
Description
If the skeleton files are not protected, unauthorized personnel could change user startup parameters and possibly jeopardize user files.
STIG Date
Draft AIX Security Technical Implementation Guide 2011-08-17

Details

Check Text ( C-37166r1_chk )
Check skeleton files for extended ACLs.
Procedure:
#aclget /etc/security/.profile
#aclget /etc/security/mkuser.sys
Check if extended permissions are disabled. If extended permissions are not disabled, this is a finding.
Fix Text (F-32451r1_fix)
Remove the extended ACL from the skeleton file(s) and disable extended permissions.

#acledit /etc/security/.profile
#acledit /etc/security/mkuser.sys