UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

All system files, programs, and directories must be owned by a system account.


Overview

Finding ID Version Rule ID IA Controls Severity
V-795 GEN001220 SV-37216r1_rule ECLP-1 Medium
Description
Restricting permissions will protect the files from unauthorized modification.
STIG Date
Red Hat Enterprise Linux 5 Security Technical Implementation Guide 2013-07-03

Details

Check Text ( C-35906r1_chk )
Check the ownership of system files, programs, and directories.

Procedure:
# ls -lLa /etc /bin /usr/bin /usr/lbin /usr/usb /sbin /usr/sbin

If any of the system files, programs, or directories are not owned by a system account, this is a finding.

Fix Text (F-31164r1_fix)
Change the owner of system files, programs, and directories to a system account.

Procedure:
# chown root /some/system/file

(A different system user may be used in place of root.)