UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The system and user default umask must be 0077 for all sessions initiated via PAM.


Overview

Finding ID Version Rule ID IA Controls Severity
V-40494 GEN000000-HPUX0470 SV-52483r1_rule ECCD-1 ECCD-2 Medium
Description
The umask controls the default access mode assigned to newly created files. An umask of 0077 limits new files to mode 0700 or less permissive. The leading zero digit represents an unsigned octal integer. This requirement applies to the globally configured system and user account defaults for all sessions initiated via PAM.
STIG Date
HP-UX 11.31 Security Technical Implementation Guide 2017-12-08

Details

Check Text ( C-47030r1_chk )
For Trusted Mode:
Check the attribute setting.
# grep UMASK /etc/default/security

If UMASK is not set to 0077, this is a finding.

For SMSE:
Check the attribute setting.
# grep UMASK /etc/default/security /var/adm/userdb/*

If UMASK is not set to 0077, this is a finding.
Fix Text (F-45443r1_fix)
For Trusted Mode:
Use the SAM/SMH interface (/etc/default/security file) to update attribute. See the below example:
UMASK=0077

For SMSE:
Note: There may be additional package/bundle updates that must be installed to support attributes in the /etc/default/security file.

Use the SAM/SMH interface (/etc/default/security file) and/or the userdbset command (/var/adm/userdb/* files) to update attribute. See the below example:
UMASK=0077

Note: Never use a text editor to modify any /var/adm/userdb database file. The database contains checksums and other binary data, and editors (vi included) do not follow the file locking conventions that are used to control access to the database.

If manually editing the /etc/default/security file, save any change(s) before exiting the editor.