Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-923 | GEN002260 | SV-45176r1_rule | DCSW-1 ECSC-1 | Low |
Description |
---|
If an unauthorized device is allowed to exist on the system, there is the possibility the system may perform unauthorized operations. |
STIG | Date |
---|---|
SUSE Linux Enterprise Server v11 for System z | 2012-12-13 |
Check Text ( C-42521r1_chk ) |
---|
Check the system for an automated job, or check with the SA, to determine if the system is checked for extraneous device files on a weekly basis. If no automated or manual process is in place, this is a finding. |
Fix Text (F-38574r1_fix) |
---|
Establish a weekly automated or manual process to create a list of device files on the system and determine if any files have been added, moved, or deleted since the last list was generated. A list of device files can be generated with this command: # find / -type b -o -type c > device-file-list |