UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The /etc/access.conf file must have a privileged group owner.


Overview

Finding ID Version Rule ID IA Controls Severity
V-1054 GEN000000-LNX00420 SV-1054r2_rule ECLP-1 Medium
Description
Depending on the access restrictions of the /etc/access.conf file, if the group owner were not a privileged group, it could endanger system security.
STIG Date
VMware ESX 3 Server 2016-05-13

Details

Check Text ( C-28799r1_chk )
Check access configuration group ownership:

# ls -lL /etc/login.access /etc/security/access.conf /etc/access.conf

If any of these files exist and are have a group-owner that is not a privileged user, this is a finding.
Fix Text (F-1208r2_fix)
Use the chgrp command to ensure the group owner is root, sys, or bin.
For example:
# chgrp root /etc/login.access /etc/security/access.conf /etc/access.conf