6.1.8 Ensure permissions on /etc/gshadow are configured

Information

The /etc/gshadow file is used to store the information about groups that is critical to the security of those accounts, such as the hashed password and other security information.

Rationale:

If attackers can gain read access to the /etc/gshadow file, they can easily run a password cracking program against the hashed password to break it. Other security information that is stored in the /etc/gshadow file (such as group administrators) could also be useful to subvert the group.

Solution

Run one of the following commands to set ownership of /etc/gshadow to root and group to either root or shadow:

# chown root:root /etc/gshadow
# chown root:shadow /etc/gshadow

Run the following command to remove excess permissions form /etc/gshadow:

# chmod u-x,g-wx,o-rwx /etc/gshadow

See Also

https://workbench.cisecurity.org/files/3219

Item Details

Category: IDENTIFICATION AND AUTHENTICATION

References: 800-53|IA-5, 800-53|IA-5(1), CSCv7|16.4

Plugin: Unix

Control ID: 7b7a7d1b3f865d2d05e08f092ce0ab66055ac8b6ee744d594afcc4869c1c1126