12.2 Verify Permissions on /etc/shadow

Information

The /etc/shadow file is used to store the information about user accounts that is critical to the security of those accounts, such as the hashed password and other security information. If attackers can gain read access to the /etc/shadow file, they can easily run a password cracking program against the hashed password to break it. Other security information that is stored in the /etc/shadow file (such as expiration) could also be useful to subvert the user accounts.

Solution

If the permissions of the /etc/shadow file are incorrect, run the following commands to correct them- # /bin/chmod 640 /etc/shadow

See Also

https://workbench.cisecurity.org/files/85

Item Details

Category: IDENTIFICATION AND AUTHENTICATION

References: 800-53|IA-5(6), CSCv6|3.1

Plugin: Unix

Control ID: 222c4dd57fdd839b494b2fbec6c77aed3850c80202b1d4816dabaa630e64668e