SV-237617r646814_rule
V-237617
SRG-OS-000259-GPOS-00100
SLES-12-010882
CAT II
10
Configure the system commands to be protected from unauthorized access. Run the following command:
> sudo find -L /bin /sbin /usr/bin /usr/sbin /usr/local/bin /usr/local/sbin ! -group root -type f -exec chgrp root '{}' \;
Verify the system commands contained in the following directories are group-owned by root:
/bin
/sbin
/usr/bin
/usr/sbin
/usr/local/bin
/usr/local/sbin
Run the check with the following command:
> sudo find -L /bin /sbin /usr/bin /usr/sbin /usr/local/bin /usr/local/sbin ! -group root -type f -exec stat -c "%n %G" '{}' \;
If any system commands are returned that are not Set Group ID up on execution (SGID) files and owned by a privileged account, this is a finding.
V-237617
False
SLES-12-010882
Verify the system commands contained in the following directories are group-owned by root:
/bin
/sbin
/usr/bin
/usr/sbin
/usr/local/bin
/usr/local/sbin
Run the check with the following command:
> sudo find -L /bin /sbin /usr/bin /usr/sbin /usr/local/bin /usr/local/sbin ! -group root -type f -exec stat -c "%n %G" '{}' \;
If any system commands are returned that are not Set Group ID up on execution (SGID) files and owned by a privileged account, this is a finding.
M
4033