7.1.5 Ensure permissions on /etc/shadow are configured

Information

The /etc/shadow file is used to store the information about user accounts that is critical to the security of those accounts, such as the hashed password and other security information.

If attackers can gain read access to the /etc/shadow file, they can easily run a password cracking program against the hashed password to break it. Other security information that is stored in the /etc/shadow file (such as expiration) could also be useful to subvert the user accounts.

Solution

Run one of the following commands to set ownership of /etc/shadow to root and group to either root or shadow :

# chown root:shadow /etc/shadow
-OR-
# chown root:root /etc/shadow

Run the following command to remove excess permissions form /etc/shadow :

# chmod u-x,g-wx,o-rwx /etc/shadow

See Also

https://workbench.cisecurity.org/benchmarks/17074

Item Details

Category: ACCESS CONTROL, MEDIA PROTECTION

References: 800-53|AC-3, 800-53|AC-5, 800-53|AC-6, 800-53|MP-2, CSCv7|14.6

Plugin: Unix

Control ID: dc97d8ebaeb37f976ab47f39f73201f03b9ac193ebc3b670d8a8e90ddd871cc7