Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-925 | GEN002300 | SV-37558r1_rule | ECCD-1 ECCD-2 | Medium |
Description |
---|
System backups could be accidentally or maliciously overwritten and destroy the ability to recover the system if a compromise should occur. Unauthorized users could also copy system files. |
STIG | Date |
---|---|
Red Hat Enterprise Linux 5 Security Technical Implementation Guide | 2013-07-03 |
Check Text ( C-36209r4_chk ) |
---|
Check the system for world-writable device files. Procedure: # find / -perm -2 -a \( -type b -o -type c \) -exec ls -ld {} \; Ask the SA to identify any device files used for backup purposes. If any device file(s) used for backup are writable by users other than root or the designated backup user, this is a finding. |
Fix Text (F-31469r1_fix) |
---|
Use the chmod command to remove the world-writable bit from the backup device files. Procedure: # chmod o-w Document all changes. |