6.1.5 Ensure permissions on /etc/gshadow are configured

Information

The /etc/gshadow file is used to store the information about groups that is critical to the security of those accounts, such as the hashed password and other security information.

Rationale:

If attackers can gain read access to the /etc/gshadow file, they can easily run a password cracking program against the hashed password to break it. Other security information that is stored in the /etc/gshadow file (such as group administrators) could also be useful to subvert the group.

Solution

Run the following commands to set permissions on /etc/gshadow:

# chown root:shadow /etc/gshadow
# chmod o-rwx,g-rw /etc/gshadow

See Also

https://workbench.cisecurity.org/files/3399

Item Details

Category: ACCESS CONTROL, MEDIA PROTECTION

References: 800-53|AC-3, 800-53|AC-5, 800-53|AC-6, 800-53|MP-2, CSCv6|16.14, CSCv7|16.4

Plugin: Unix

Control ID: 1e8feb0310a9a4997d47dbeb2cc2f893749bfabb73d3278245dd7b46a6c8a04b