GEN001140 - System files and directories must not have uneven access permissions - '/sbin/*' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN001140 - System files and directories must not have uneven access permissions - '/usr/lbin/*' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN001290 - All manual page files must not have extended ACLs - '/usr/share/man' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN001379 - The /etc/passwd file must be group-owned by root, bin, or sys. | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN001430 - The /etc/shadow (or equivalent) file must not have an extended ACL. | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN001500 - All interactive user home directories must be owned by their respective users. | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN001550 - Files and directories in user home directories must be group-owned by a group of which the home directory's owner is a member. | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN001580 - All run control scripts must have mode 0755 or less permissive - '/etc/rc.d/rc1.d/*' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN001640 - Run control scripts must not execute world-writable programs or scripts. | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN001680 - All system start-up files must be group-owned by root, sys, bin, other, or system. | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN001720 - All global initialization files must have mode 0644 or less permissive - '/etc/csh.cshrc' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN001730 - All global initialization files must not have extended ACLs - '/etc/ksh.kshrc' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN001730 - All global initialization files must not have extended ACLs - '/etc/profile.d/*' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN001740 - All global initialization files must be owned by root - '/etc/profile' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN001760 - All global initialization files must be group-owned by root, sys, bin, other, system, or the system default - '/etc/csh.login' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN001830 - All skeleton files (typically in /etc/skel) must be group-owned by root, bin, sys, system, or other. | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN001880 - All local initialization files must have mode 0740 or less permissive - '.bash_profile' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN001880 - All local initialization files must have mode 0740 or less permissive - '.emacs' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN001880 - All local initialization files must have mode 0740 or less permissive - '.env' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN001880 - All local initialization files must have mode 0740 or less permissive - '.profile' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN001940 - User start-up files must not execute world-writable programs. | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN002060 - All .rhosts, .shosts, .netrc, or hosts.equiv files must be accessible by only root or the owner - '/etc/hosts.equiv' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN002060 - All .rhosts, .shosts, .netrc, or hosts.equiv files must be accessible by only root or the owner - Group '.shosts' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN002210 - All shell files must be group-owned by root, bin, sys, or system. | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN002320 - Audio devices must have mode 0664 or less permissive - '/dev/snd/*' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN002330 - Audio devices must not have extended ACLs - '/dev/audio*' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN002540 - All public directories must be group-owned by root, sys, bin, or an application group. | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN002960 - Access to the cron utility must be controlled using the cron.allow and/or cron.deny file(s) - 'cron.deny exists' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN003020 - Cron must not execute programs in, or subordinate to, world-writable directories. | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN003040 - Crontabs must be owned by root or the crontab creator - '/etc/crontab' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN003060 - System accounts must not be listed in cron.allow or must be included in cron.deny - 'adm' - cron.deny | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN003060 - System accounts must not be listed in cron.allow or must be included in cron.deny - 'bin' - cron.allow | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN003060 - System accounts must not be listed in cron.allow or must be included in cron.deny - 'halt' - cron.deny | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN003060 - System accounts must not be listed in cron.allow or must be included in cron.deny - 'lp' - cron.allow | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN003060 - System accounts must not be listed in cron.allow or must be included in cron.deny - 'mail' - cron.deny | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN003060 - System accounts must not be listed in cron.allow or must be included in cron.deny - 'operator' - cron.deny | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN003060 - System accounts must not be listed in cron.allow or must be included in cron.deny - 'uucp' - cron.allow | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN003090 - Crontab files must not have extended ACLs - '/var/spool/cron' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN003110 - Cron and crontab directories must not have extended ACLs - '/etc/cron.daily' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN005395 - The /etc/syslog.conf file must not have an extended ACL. | DISA STIG AIX 6.1 v1r14 | Unix | ACCESS CONTROL |
GEN005400 - The /etc/syslog.conf file must be owned by root. | DISA STIG AIX 6.1 v1r14 | Unix | ACCESS CONTROL |
GEN005760 - The NFS export configuration file must have mode 0644 or less permissive. | DISA STIG AIX 6.1 v1r14 | Unix | ACCESS CONTROL |
GEN005800 - All NFS-exported system files and system directories must be owned by root. | DISA STIG AIX 6.1 v1r14 | Unix | ACCESS CONTROL |
GEN006150 - The /usr/lib/smb.conf file must not have an extended ACL. | DISA STIG AIX 6.1 v1r14 | Unix | ACCESS CONTROL |
GEN006210 - The /var/private/smbpasswd file must not have an extended ACL. | DISA STIG AIX 6.1 v1r14 | Unix | ACCESS CONTROL |
GEN006220 - The smb.conf file must use the hosts option to restrict access to Samba. | DISA STIG AIX 6.1 v1r14 | Unix | ACCESS CONTROL |
GEN008060 - If the system is using LDAP the /etc/ldap.conf file must have mode 0644 or less permissive | DISA STIG AIX 6.1 v1r14 | Unix | ACCESS CONTROL |
GEN008080 - If the system is using LDAP the /etc/ldap.conf file must be owned by root | DISA STIG AIX 6.1 v1r14 | Unix | ACCESS CONTROL |
GEN008140 - The TLS certificate authority file and/or directory (as appropriate) must be owned by root | DISA STIG AIX 6.1 v1r14 | Unix | ACCESS CONTROL |
GEN008200 - The LDAP TLS certificate authority file must not have an extended ACL | DISA STIG AIX 6.1 v1r14 | Unix | ACCESS CONTROL |