GEN001830 - All skeleton files (typically in /etc/skel) must be group-owned by root, bin, sys, system, or other.

Information

If the skeleton files are not protected, unauthorized personnel could change user startup parameters and possibly jeopardize user files.

Solution

Change the group-owner of the skeleton file to root, bin, sys, system, or other.

Procedure:
# chgrp <group> /etc/skel/[skeleton file]
or:
# ls -L /etc/skel|xargs stat -L -c %G:%n|egrep -v '^(root|bin|sy|sytem|other):'|cut -d: -f2|chgrp root
will change the group of all files not already one of the approved group to root.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Oracle_Linux_5_V2R1_STIG.zip

Item Details

Category: ACCESS CONTROL, CONFIGURATION MANAGEMENT

References: 800-53|AC-6, 800-53|CM-5(6), CAT|II, CCI|CCI-000225, CCI|CCI-001499, Rule-ID|SV-218333r603259_rule, STIG-ID|GEN001830, STIG-Legacy|SV-63323, STIG-Legacy|V-22358, Vuln-ID|V-218333

Plugin: Unix

Control ID: 190f8a11ba47baf212e84eb44aaa8a3196b9bf2a3e9a5b0d925cb1b0cc51d2ec