UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

HAProxy libraries, and configuration files must only be accessible to privileged users.


Overview

Finding ID Version Rule ID IA Controls Severity
V-89197 VRAU-HA-000390 SV-99847r1_rule Medium
Description
A web server can be modified through parameter modification, patch installation, upgrades to the web server or modules, and security parameter changes. With each of these changes, there is the potential for an adverse effect such as a DoS, web server instability, or hosted application instability. To limit changes to the web server and limit exposure to any adverse effects from the changes, files such as the web server application files, libraries, and configuration files must have permissions and ownership set properly to only allow privileged users access.
STIG Date
VMW vRealize Automation 7.x HA Proxy Security Technical Implementation Guide 2018-10-12

Details

Check Text ( C-88889r1_chk )
At the command prompt, execute the following command:

ls -alR /etc/haproxy /etc/init.d/haproxy /usr/sbin/haproxy

If any configuration or application files have permissions greater than "750" or are not owned by "root", this is a finding.
Fix Text (F-95939r1_fix)
Navigate to any listed files with incorrect permissions or ownership and set them in accordance with site policy.