UCF STIG Viewer Logo

The system must be checked for extraneous device files at least weekly.


Overview

Finding ID Version Rule ID IA Controls Severity
V-923 GEN002260 SV-38504r1_rule ECSC-1 Low
Description
If an unauthorized device is allowed to exist on the system, there is the possibility the system may perform unauthorized operations.
STIG Date
HP-UX 11.31 Security Technical Implementation Guide 2018-09-14

Details

Check Text ( C-36414r1_chk )
NOTE: This will virtually always be a manual review. Check the system for an automated job, or check with the SA, to determine if the system is checked for extraneous device files on a weekly basis. If no automated or manual process is in place, this is a finding.
Fix Text (F-31752r1_fix)
Establish a weekly automated or manual process to create a list of device files on the system and determine if any files have been added, moved, or deleted since the last list was generated. A list of device files can be generated with this command:
# find / -type b -o -type c -o -type n > device-file-list