UCF STIG Viewer Logo

All system files, programs, and directories must be owned by a system account.


Overview

Finding ID Version Rule ID IA Controls Severity
V-795 GEN001220 SV-37216r1_rule ECLP-1 Medium
Description
Restricting permissions will protect the files from unauthorized modification.
STIG Date
Red Hat Enterprise Linux 5 Security Technical Implementation Guide 2014-07-02

Details

Check Text ( None )
None
Fix Text (F-31164r1_fix)
Change the owner of system files, programs, and directories to a system account.

Procedure:
# chown root /some/system/file

(A different system user may be used in place of root.)