VCLD-67-000032 - VAMI configuration files must be protected from unauthorized access - etc

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Accounts on the VAMI server are to be kept to a minimum. Only administrators, web managers, developers, auditors, and web authors require accounts on the machine hosting the Lighttpd server. The resources to which these accounts have access must also be closely monitored and controlled. Only the system administrator needs access to all of the system's capabilities, while the web administrator and associated staff require access and control of the web content and the Lighttpd server configuration files.

Solution

At the command prompt, enter the following command:

# chmod 644 <file>
# chown root:root <file>

Note: Replace <file> with every file returned from the command in the check.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_VMW_vSphere_6-7_STIG.zip

Item Details

References: CAT|II, CCI|CCI-001813, Rule-ID|SV-239739r679327_rule, STIG-ID|VCLD-67-000032, Vuln-ID|V-239739

Plugin: Unix

Control ID: af1a471a7b599cac093b42bed75c656d80ce409da473474651913ae3e970178b