UCF STIG Viewer Logo

Device files used for backup must only be readable and/or writable by root or the backup user.


Overview

Finding ID Version Rule ID IA Controls Severity
V-925 GEN002300 SV-37558r1_rule ECCD-1 ECCD-2 Medium
Description
System backups could be accidentally or maliciously overwritten and destroy the ability to recover the system if a compromise should occur. Unauthorized users could also copy system files.
STIG Date
Red Hat Enterprise Linux 5 Security Technical Implementation Guide 2017-03-01

Details

Check Text ( C-36209r4_chk )
Check the system for world-writable device files.

Procedure:
# find / -perm -2 -a \( -type b -o -type c \) -exec ls -ld {} \;

Ask the SA to identify any device files used for backup purposes.

If any device file(s) used for backup are writable by users other than root or the designated backup user, this is a finding.
Fix Text (F-31469r1_fix)
Use the chmod command to remove the world-writable bit from the backup device files.

Procedure:
# chmod o-w

Document all changes.