3.7 Ensure no files or directories without an owner and a group exist

Information

When a user or group identifier is removed from the system verify that any data associated with the ID removed is either removed or re-assigned.

Worst case: a previously removed UID/GID is re-instated. Data left behind suddenly is owned and/or accessible to the new ID - gaining unintended access to data left-behind.

Solution

Review the currently mounted

local

filesystems:

find / ( -fstype jfs -o -fstype jfs2 ) ( -type d -o -type f ) ( -nouser -o -nogroup ) -ls
- Either assign UID/GID:

chown <owner> <file>
chgrp <group> <file>
- or remove the file/directory:

[[ -f <file> ]] &amp;&amp; rm -f <file>
[[ -d <file> ]] &amp;&amp; rmdir <file>
- Repeat the audit

See Also

https://workbench.cisecurity.org/benchmarks/10385

Item Details

Category: MEDIA PROTECTION

References: 800-53|MP-6

Plugin: Unix

Control ID: 688c061fac3cc893693899a9a8516c5c73fae94ded453d398c5888cc422b0d59