Check: GEN001660
HP-UX 11.23 STIG:
GEN001660
(in version v1 r8)
Title
All system start-up files must be owned by root. (Cat II impact)
Discussion
System start-up files not owned by root could lead to system compromise by allowing malicious users or applications to modify them for unauthorized purposes. This could lead to system and network compromise.
Check Content
System start-up files are identified as follows: Run control scripts reside in the /sbin/init.d directory. Links to the run control scripts exist in the /sbin/rc*.d directories. Run control configuration files exist in the /etc/rc.config.d directory. Check all system start-up script file ownership. # ls -lL /sbin/init.d/* /sbin/rc*.d/* /etc/rc.config.d/* If any system start-up script file is not owned by root or bin, this is a finding.
Fix Text
Change the ownership of the run control script(s) with incorrect ownership. # chown root <run control script>
Additional Identifiers
Rule ID: SV-38420r1_rule
Vulnerability ID: V-4089
Group Title: GEN001660
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000225 |
The organization employs the concept of least privilege, allowing only authorized accesses for users (and processes acting on behalf of users) which are necessary to accomplish assigned tasks in accordance with organizational missions and business functions. |
Controls
Number | Title |
---|---|
AC-6 |
Least Privilege |