UCF STIG Viewer Logo

All system files, programs, and directories must be owned by a system account.


Overview

Finding ID Version Rule ID IA Controls Severity
V-795 GEN001220 SV-37216r1_rule ECLP-1 Medium
Description
Restricting permissions will protect the files from unauthorized modification.
STIG Date
Red Hat Enterprise Linux 5 Security Technical Implementation Guide 2017-03-01

Details

Check Text ( C-35906r1_chk )
Check the ownership of system files, programs, and directories.

Procedure:
# ls -lLa /etc /bin /usr/bin /usr/lbin /usr/usb /sbin /usr/sbin

If any of the system files, programs, or directories are not owned by a system account, this is a finding.

Fix Text (F-31164r1_fix)
Change the owner of system files, programs, and directories to a system account.

Procedure:
# chown root /some/system/file

(A different system user may be used in place of root.)