Check: GEN001190
Solaris 9 X86 STIG:
GEN001190
(in version v1 r9)
Title
All network services daemon files must not have extended ACLs. (Cat II impact)
Discussion
Restricting permission on daemons will protect them from unauthorized modification and possible system compromise.
Check Content
Verify network services daemon files have no extended ACLs. # ls -la /usr/sbin # ls -la /usr/bin If the permissions include a "+", the file has an extended ACL and this is a finding. NOTE: Network daemons not residing in these directories (such as httpd or sshd) must also be checked for the correct permissions. A way to locate network daemons, such as httpd and sshd, is with the ps command. # ps -ef | egrep '(sshd|httpd)'
Fix Text
Remove the extended ACL from the file. # getfacl [file with extended ACL] Remove each ACE returned. # setfacl -d [ACE] [file with extended ACL]
Additional Identifiers
Rule ID: SV-26360r1_rule
Vulnerability ID: V-22313
Group Title:
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000225 |
The organization employs the concept of least privilege, allowing only authorized accesses for users (and processes acting on behalf of users) which are necessary to accomplish assigned tasks in accordance with organizational missions and business functions. |
Controls
Number | Title |
---|---|
AC-6 |
Least Privilege |