SOL-11.1-070190 - All valid SUID/SGID files must be documented.

Information

There are valid reasons for SUID/SGID programs, but it is important to identify and review such programs to ensure they are legitimate.

NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.

Solution

The root role is required.

Determine the existence of any set-UID programs that do not belong on the system, and work with the owners (or system administrator) to determine the best course of action in accordance with site policy.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_SOL_11_x86_V3R1_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|III, CCI|CCI-000366, Rule-ID|SV-216198r959010_rule, STIG-ID|SOL-11.1-070190, STIG-Legacy|SV-60931, STIG-Legacy|V-48059, Vuln-ID|V-216198

Plugin: Unix

Control ID: dbe8d71d367e52053a183f9df779008c759082e71a11742a7255a75f9f2bafb4