Check: GEN003420
HP-UX 11.31 STIG:
GEN003420
(in versions v1 r19 through v1 r13)
Title
The at directory must be owned by root, bin, or sys. (Cat II impact)
Discussion
If the owner of the at directory is not root, bin, or sys, unauthorized users could be allowed to view or edit files containing sensitive information within the directory.
Check Content
Check the ownership of the at directory: # ls -lLd /var/spool/cron/atjobs /var/spool/atjobs /var/spool/at If the directory exists and is not owned by root, sys, or bin, this is a finding.
Fix Text
Change the owner of the existing at directory to root, bin, or sys. # chown root <at directory> (Replace root with another system group and/or <at directory> with a different at directory as necessary.)
Additional Identifiers
Rule ID: SV-38434r1_rule
Vulnerability ID: V-4365
Group Title: GEN003420
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000225 |
The organization employs the concept of least privilege, allowing only authorized accesses for users (and processes acting on behalf of users) which are necessary to accomplish assigned tasks in accordance with organizational missions and business functions. |
Controls
Number | Title |
---|---|
AC-6 |
Least Privilege |