SV-238378r654309_rule
V-238378
SRG-OS-000259-GPOS-00100
UBTU-20-010458
CAT II
10
Configure the system commands to be protected from unauthorized access. Run the following command:
$ sudo find /bin /sbin /usr/bin /usr/sbin /usr/local/bin /usr/local/sbin ! -group root -type f ! -perm /2000 -exec chgrp root '{}' \;
Verify the system commands contained in the following directories are group-owned by root:
/bin
/sbin
/usr/bin
/usr/sbin
/usr/local/bin
/usr/local/sbin
Run the check with the following command:
$ sudo find -L /bin /sbin /usr/bin /usr/sbin /usr/local/bin /usr/local/sbin ! -group root -type f -exec stat -c "%n %G" '{}' \;
If any system commands are returned that are not Set Group ID up on execution (SGID) files and owned by a privileged account, this is a finding.
V-238378
False
UBTU-20-010458
Verify the system commands contained in the following directories are group-owned by root:
/bin
/sbin
/usr/bin
/usr/sbin
/usr/local/bin
/usr/local/sbin
Run the check with the following command:
$ sudo find -L /bin /sbin /usr/bin /usr/sbin /usr/local/bin /usr/local/sbin ! -group root -type f -exec stat -c "%n %G" '{}' \;
If any system commands are returned that are not Set Group ID up on execution (SGID) files and owned by a privileged account, this is a finding.
M
5318