STIGQter STIGQter: STIG Summary: Solaris 10 X86 Security Technical Implementation Guide Version: 2 Release: 2 Benchmark Date: 22 Jan 2021:

All network services daemon files must not have extended ACLs.

DISA Rule

SV-227614r603266_rule

Vulnerability Number

V-227614

Group Title

SRG-OS-000480

Rule Version

GEN001190

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Remove the extended ACL from the file.
# chmod A- [file with extended ACL]

Check Contents

Verify network services daemon files have no extended ACLs.
# ls -la /usr/sbin
# ls -la /usr/bin
If the permissions include a "+", the file has an extended ACL and this is a finding.
NOTE: Network daemons not residing in these directories (such as httpd or sshd) must also be checked for the correct permissions.

A way to locate network daemons, such as httpd and sshd, is with the ps command.
# ps -ef | egrep '(sshd|httpd)'

Vulnerability Number

V-227614

Documentable

False

Rule Version

GEN001190

Severity Override Guidance

Verify network services daemon files have no extended ACLs.
# ls -la /usr/sbin
# ls -la /usr/bin
If the permissions include a "+", the file has an extended ACL and this is a finding.
NOTE: Network daemons not residing in these directories (such as httpd or sshd) must also be checked for the correct permissions.

A way to locate network daemons, such as httpd and sshd, is with the ps command.
# ps -ef | egrep '(sshd|httpd)'

Check Content Reference

M

Target Key

4061

Comments