Check: GEN003420
AIX 6.1 SECURITY TECHNICAL IMPLEMENTATION GUIDE:
GEN003420
(in versions v1 r14 through v1 r10)
Title
The at directory must be owned by root, bin, sys, daemon, or cron. (Cat II impact)
Discussion
If the owner of the at directory is not root, bin, sys, daemon, or cron unauthorized users could be allowed to view or edit files containing sensitive information within the directory.
Check Content
Check the ownership of the at directory. Procedure: # ls -ld /var/spool/cron/atjobs If the directory is not owned by root, bin, sys, daemon, or cron, this is a finding.
Fix Text
Change the owner of the at directory to root, bin, sys, daemon, or cron. Procedure: # chown bin /var/spool/cron/atjobs
Additional Identifiers
Rule ID: SV-39350r1_rule
Vulnerability ID: V-4365
Group Title: GEN003420
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000225 |
The organization employs the concept of least privilege, allowing only authorized accesses for users (and processes acting on behalf of users) which are necessary to accomplish assigned tasks in accordance with organizational missions and business functions. |
Controls
Number | Title |
---|---|
AC-6 |
Least Privilege |