VCST-67-000017 - The Security Token Service directory tree must have permissions in an 'out-of-the-box' state - out-of-the-box state.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

As a rule, accounts on a web server are to be kept to a minimum. Only administrators, web managers, developers, auditors, and web authors require accounts on the machine hosting the web server. The resources to which these accounts have access must also be closely monitored and controlled. The Security Token Service files must be adequately protected with correct permissions as applied out of the box.

Satisfies: SRG-APP-000211-WSR-000030, SRG-APP-000380-WSR-000072

Solution

Connect to the PSC, whether external or embedded.

At the command prompt, execute the following command:

# chown root:root <file_name>

Repeat the command for each file that was returned.

Note: Replace <file_name> for the name of the file that was returned.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_VMW_vSphere_6-7_Y22M10_STIG.zip

Item Details

References: CAT|II, CCI|CCI-001082, CCI|CCI-001813, Rule-ID|SV-239668r816729_rule, STIG-ID|VCST-67-000017, Vuln-ID|V-239668

Plugin: Unix

Control ID: 797ae30651b37aca403821930628fd043fb3c29a01a7ded3d790b0fb48298ef4