Check: GEN001390
Solaris 10 SPARC STIG:
GEN001390
(in versions v2 r4 through v1 r19)
Title
The /etc/passwd file must not have an extended ACL. (Cat II impact)
Discussion
File system ACLs can provide access to files beyond what is allowed by the mode numbers of the files. The /etc/passwd file contains the list of local system accounts. It is vital to system security and must be protected from unauthorized modification.
Check Content
Verify /etc/passwd has no extended ACL. # ls -l /etc/passwd If the permissions include a "+", the file has an extended ACL, this is a finding.
Fix Text
Remove the extended ACL from the file. # chmod A- /etc/passwd
Additional Identifiers
Rule ID: SV-226517r603265_rule
Vulnerability ID: V-226517
Group Title: SRG-OS-000480
Expert Comments
Expert comments are only available to logged-in users.
CCIs
CCIs tied to check.
Number | Definition |
---|---|
CCI-000366 |
The organization implements the security configuration settings. |
Controls
Controls tied to check. These are derived from the CCIs shown above.
Number | Title |
---|---|
CM-6 |
Configuration Settings |