9.8 Check Permissions on User '.' (Hidden) Files

Information

While the system administrator can establish secure permissions for users' "dot" files, the users can easily override these.

Group or world-writable user configuration files may enable malicious users to steal or modify other users' data or to gain another user's system privileges.

Solution

Correct or justify any items discovered in the Audit step. Determine if any user hidden files are world-readable or writable, and work with those users to determine the best course of action in accordance with site policy.

See Also

https://workbench.cisecurity.org/files/612

Item Details

Category: IDENTIFICATION AND AUTHENTICATION

References: 800-53|IA-5(1)(d)

Plugin: Unix

Control ID: fa7b50dc06878366e45f3e0fe7395252409d42b30664b2f2d146f4c0e410085f