BSI-100-2: S 4.22: Prevention of loss of confidentiality of sensitive data in the Unix system: Restrict access to commands

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

With Linux commands such as ps, finger, who and last, information can be obtained about a user. In case of doubt, access to these commands should be restricted.

Safeguard Catalogues: S 4: Hardware and software

S 4.22: Prevention of loss of confidentiality of sensitive data in the Unix system

See Also

https://www.bsi.bund.de/cae/servlet/contentblob/471430/publicationFile/28223/standard_100-2_e_pdf.pdf

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-2

Plugin: Unix

Control ID: 51f22fc64cb80e2b437ed163c10def8e60e7aa53d8a7b04d1931bc5390e56785