UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Device files used for backup must only be readable and/or writable by root or the backup user.


Overview

Finding ID Version Rule ID IA Controls Severity
V-925 GEN002300 SV-37558r1_rule ECCD-1 ECCD-2 Medium
Description
System backups could be accidentally or maliciously overwritten and destroy the ability to recover the system if a compromise should occur. Unauthorized users could also copy system files.
STIG Date
Red Hat Enterprise Linux 5 Security Technical Implementation Guide 2012-05-25

Details

Check Text ( C-36209r4_chk )
Check the system for world-writable device files.

Procedure:
# find / -perm -2 -a \( -type b -o -type c \) -exec ls -ld {} \;

Ask the SA to identify any device files used for backup purposes.

If any device file(s) used for backup are writable by users other than root or the designated backup user, this is a finding.
Fix Text (F-31469r1_fix)
Use the chmod command to remove the world-writable bit from the backup device files.

Procedure:
# chmod o-w

Document all changes.