UCF STIG Viewer Logo

All network services daemon files must not have extended ACLs.


Overview

Finding ID Version Rule ID IA Controls Severity
V-22313 GEN001190 SV-44934r1_rule Medium
Description
Restricting permission on daemons will protect them from unauthorized modification and possible system compromise.
STIG Date
SUSE Linux Enterprise Server v11 for System z Security Technical Implementation Guide 2018-09-19

Details

Check Text ( C-42368r1_chk )
Check that network services daemon files have no extended ACLs.
# ls -la /usr/sbin
If the permissions include a '+', the file has an extended ACL. If the file has an extended ACL and it has not been documented with the IAO, this is a finding.
Fix Text (F-38359r1_fix)
Remove the extended ACL from the file.
# setfacl --remove-all /usr/sbin/*