UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

All global initialization files must be group-owned by root, sys, or bin.


Overview

Finding ID Version Rule ID IA Controls Severity
V-11983 GEN001760 SV-39831r1_rule ECLP-1 Medium
Description
Global initialization files are used to configure the user's shell environment upon login. Malicious modification of these files could compromise accounts upon logon. Failure to give ownership of sensitive files or utilities to root or bin provides the designated owner and unauthorized users with the potential to access sensitive information or change the system configuration which could weaken the system's security posture.
STIG Date
Solaris 9 X86 Security Technical Implementation Guide 2013-01-10

Details

Check Text ( C-38708r1_chk )
Check the group ownership of global initialization files.

Procedure:
# ls -lL /etc/.login /etc/profile /etc/bashrc /etc/environment /etc/security/environ /etc/csh.login /etc/csh.cshrc

If any global initialization file exists and is not group-owned by root, sys, or bin, this is a finding.
Fix Text (F-11244r4_fix)
Change the group ownership of the global initialization file(s) with incorrect group ownership.

Procedure:
# chgrp root