UCF STIG Viewer Logo

Skeleton files must not have extended ACLs.


Overview

Finding ID Version Rule ID IA Controls Severity
V-22357 GEN001810 SV-38346r1_rule ECLP-1 Medium
Description
If the skeleton files are not protected, unauthorized personnel could change user startup parameters and possibly jeopardize user files.
STIG Date
HP-UX 11.23 Security Technical Implementation Guide 2015-12-02

Details

Check Text ( C-36385r1_chk )
Check skeleton files for extended ACLs.
# ls -alL /etc/skel

If the permissions include a "+", the file has an extended ACL, this is a finding.
Fix Text (F-31724r1_fix)
Remove the optional ACL from the file.
# chacl -z [skeleton file with extended ACL]