Check: RHEL-07-021040
Red Hat Enterprise Linux 7 STIG:
RHEL-07-021040
(in versions v3 r14 through v3 r9)
Title
The Red Hat Enterprise Linux operating system must set the umask value to 077 for all local interactive user accounts. (Cat II impact)
Discussion
The umask controls the default access mode assigned to newly created files. A umask of 077 limits new files to mode 700 or less permissive. Although umask can be represented as a four-digit number, the first digit representing special access modes is typically ignored or required to be "0". This requirement applies to the globally configured system defaults and the local interactive user defaults for each account on the system.
Check Content
Verify that the default umask for all local interactive users is "077". Identify the locations of all local interactive user home directories by looking at the "/etc/passwd" file. Check all local interactive user initialization files for interactive users with the following command: Note: The example is for a system that is configured to create users home directories in the "/home" directory. $ sudo grep -ir ^umask /home | grep -v '.bash_history' If any local interactive user initialization files are found to have a umask statement that has a value less restrictive than "077", this is a finding.
Fix Text
Remove the umask statement from all local interactive user's initialization files. If the account is for an application, the requirement for a umask less restrictive than "077" can be documented with the Information System Security Officer, but the user agreement for access to the account must specify that the local interactive user must log on to their account first and then switch the user to the application account with the correct option to gain the account's environment variables.
Additional Identifiers
Rule ID: SV-204488r861006_rule
Vulnerability ID: V-204488
Group Title: SRG-OS-000480-GPOS-00227
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000318 |
The organization audits and reviews activities associated with configuration-controlled changes to the system. |
CCI-000368 |
The organization documents any deviations from the established configuration settings for organization-defined information system components based on organization-defined operational requirements. |
CCI-001812 |
The information system prohibits user installation of software without explicit privileged status. |
CCI-001813 |
The information system enforces access restrictions. |
CCI-001814 |
The Information system supports auditing of the enforcement actions. |