GEN000251 - The time synchronization configuration file (such as /etc/ntp.conf) must be group-owned by root, bin, sys, or system. | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN000920 - The root account's home directory (other than /) must have mode 0700. | DISA STIG AIX 6.1 v1r14 | Unix | ACCESS CONTROL |
GEN001140 - System files and directories must not have uneven access permissions - '/usr/bin/*' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN001140 - System files and directories must not have uneven access permissions - '/usr/usb/*' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN001280 - Manual page files must have mode 0644 or less permissive - '/usr/share/info/*' | DISA STIG AIX 6.1 v1r14 | Unix | ACCESS CONTROL |
GEN001280 - Manual page files must have mode 0644 or less permissive - '/usr/share/man/*' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN001320 - NIS/NIS+/yp files must be owned by root, sys, or bin - '/var/nis/*' | DISA STIG AIX 6.1 v1r14 | Unix | ACCESS CONTROL |
GEN001340 - NIS/NIS+/yp files must be group-owned by sys, bin, other, or system - '/usr/lib/netsvc/yp/*' | DISA STIG AIX 6.1 v1r14 | Unix | ACCESS CONTROL |
GEN001340 - NIS/NIS+/yp files must be group-owned by sys, bin, other, or system - '/usr/lib/nis/*' | DISA STIG AIX 6.1 v1r14 | Unix | ACCESS CONTROL |
GEN001361 - NIS/NIS+/yp command files must not have extended ACLs - '/var/yp' | DISA STIG AIX 6.1 v1r14 | Unix | ACCESS CONTROL |
GEN001369 - The /etc/hosts file must not have an extended ACL. | DISA STIG AIX 6.1 v1r14 | Unix | ACCESS CONTROL |
GEN001380 - The /etc/passwd file must have mode 0644 or less permissive. | DISA STIG AIX 6.1 v1r14 | Unix | ACCESS CONTROL |
GEN001391 - The /etc/group file must be owned by root. | DISA STIG AIX 6.1 v1r14 | Unix | ACCESS CONTROL |
GEN001460 - All interactive user home directories defined in the /etc/passwd file must exist. | DISA STIG AIX 6.1 v1r14 | Unix | ACCESS CONTROL |
GEN003260 - The cron.deny file must be owned by root, bin, or sys. | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN003320 - System accounts must not be listed in at.allow or must be included in at.deny - 'adm' - at.deny | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN003320 - System accounts must not be listed in at.allow or must be included in at.deny - 'bin' - at.allow | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN003320 - System accounts must not be listed in at.allow or must be included in at.deny - 'games' - at.allow | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN003320 - System accounts must not be listed in at.allow or must be included in at.deny - 'news' - at.allow | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN003720 - The xinetd.conf file, and the xinetd.d directory must be owned by root or bin - '/etc/xinetd.conf' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN003730 - The xinetd.conf file, and the xinetd.d directory must be group-owned by root, bin, sys, or system - '/etc/xinetd.d' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN003755 - The xinetd.d directory must not have an extended ACL. | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN003780 - The services file must have mode 0644 or less permissive. | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN003940 - The hosts.lpd (or equivalent) must have mode 0644 or less permissive. | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN004360 - The alias file must be owned by root - '/etc/aliases' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN004370 - The aliases file must be group-owned by root, sys, bin, or system - '/etc/aliases.db' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN004370 - The aliases file must be group-owned by root, sys, bin, or system - '/etc/postfix/aliases' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN004420 - Files executed through a mail aliases file must have mode 0755 or less permissive. | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN004500 - The SMTP service log file must have mode 0644 or less permissive. | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN004880 - The ftpusers file must exist. | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN004900 - The ftpusers file must contain account names not allowed to use FTP. | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN004920 - The ftpusers file must be owned by root - '/etc/vsftpd.ftpusers' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN004920 - The ftpusers file must be owned by root - '/etc/vsftpd/ftpusers' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN004940 - The ftpusers file must have mode 0640 or less permissive - '/etc/ftpusers' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN004950 - The ftpusers file must not have an extended ACL - '/etc/vsftpd.ftpusers' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN004950 - The ftpusers file must not have an extended ACL - '/etc/vsftpd/ftpusers' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN005190 - The .Xauthority files must not have extended ACLs. | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN005395 - The /etc/syslog.conf file must not have an extended ACL. | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN005522 - The SSH public host key files must have mode 0644 or less permissive. | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN005523 - The SSH private host key files must have mode 0600 or less permissive. | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN005537 - The SSH daemon must use privilege separation. | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN005750 - The NFS export configuration file must be group-owned by root, bin, sys, or system. | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN006280 - The /etc/news/infeed.conf (or equivalent) must have mode 0600 or less permissive. | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN006330 - The /etc/news/passwd.nntp file must not have an extended ACL. | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN008060 - If using LDAP for authentication or account information the /etc/ldap.conf file must have mode 0644 or less permissive. | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN008100 - If using LDAP for auth or account information, the /etc/ldap.conf file must be group-owned by root, bin, sys, or system. | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN008140 - If using LDAP for auth or account information, the TLS certificate auth file and dir must be owned by root - '/etc/ssl/certs' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN008160 - Using LDAP for auth or account info, the TLS cert file and dir must be group-owned by root,bin,sys,or system - '/etc/ssl/' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN008240 - Using LDAP for auth or acct info, TLS cert must be group-owned by root,bin,sys,or system - '/etc/openldap/cacerts/cert.pem' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN008300 - If using LDAP for auth or acct info, the LDAP TLS key file must be owned by root - '/etc/openldap/cacerts/key.pem' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |