UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The /etc/access.conf file must have a privileged group owner.


Overview

Finding ID Version Rule ID IA Controls Severity
V-1054 GEN000000-LNX00420 SV-44653r1_rule ECLP-1 Medium
Description
Depending on the access restrictions of the /etc/access.conf file, if the group owner were not a privileged group, it could endanger system security.
STIG Date
SUSE Linux Enterprise Server v11 for System z 2012-12-13

Details

Check Text ( C-42157r1_chk )
Check access configuration group ownership:

# ls -lL /etc/security/access.conf

If this file exists and has a group-owner that is not a privileged user, this is a finding.
Fix Text (F-38108r1_fix)
Use the chgrp command to ensure the group owner is root, sys, or bin.
For example:
# chgrp root /etc/security/access.conf