GEN001800 - All skeleton files (typically those in /etc/skel) must have mode 0644 or less permissive.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

If the skeleton files are not protected, unauthorized personnel could change user startup parameters and possibly jeopardize user files.

Solution

Change the mode of skeleton files with incorrect mode.
# chmod 0644 <skeleton file>

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_SOL_10_SPARC_V2R2_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6, CAT|II, CCI|CCI-002165, CSCv6|3.1, Rule-ID|SV-226546r603265_rule, STIG-ID|GEN001800, STIG-Legacy|SV-788, STIG-Legacy|V-788, Vuln-ID|V-226546

Plugin: Unix

Control ID: 2518a523bf0b503cacaf3065e325582e1e558a5a1df750ef16e365b313845aad