GEN001880 - All local initialization files must have mode 0740 or less permissive - '.env' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN001880 - All local initialization files must have mode 0740 or less permissive - '.profile' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN001940 - User start-up files must not execute world-writable programs. | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN002060 - All .rhosts, .shosts, .netrc, or hosts.equiv files must be accessible by only root or the owner - '/etc/hosts.equiv' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN002060 - All .rhosts, .shosts, .netrc, or hosts.equiv files must be accessible by only root or the owner - Group '.shosts' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN002210 - All shell files must be group-owned by root, bin, sys, or system. | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN002320 - Audio devices must have mode 0664 or less permissive - '/dev/snd/*' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN002330 - Audio devices must not have extended ACLs - '/dev/audio*' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN002540 - All public directories must be group-owned by root, sys, bin, or an application group. | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN002960 - Access to the cron utility must be controlled using the cron.allow and/or cron.deny file(s) - 'cron.deny exists' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN003020 - Cron must not execute programs in, or subordinate to, world-writable directories. | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN003040 - Crontabs must be owned by root or the crontab creator - '/etc/crontab' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN003060 - System accounts must not be listed in cron.allow or must be included in cron.deny - 'adm' - cron.deny | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN003060 - System accounts must not be listed in cron.allow or must be included in cron.deny - 'bin' - cron.allow | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN003060 - System accounts must not be listed in cron.allow or must be included in cron.deny - 'halt' - cron.deny | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN003060 - System accounts must not be listed in cron.allow or must be included in cron.deny - 'lp' - cron.allow | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN003060 - System accounts must not be listed in cron.allow or must be included in cron.deny - 'mail' - cron.deny | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN003060 - System accounts must not be listed in cron.allow or must be included in cron.deny - 'operator' - cron.deny | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN003060 - System accounts must not be listed in cron.allow or must be included in cron.deny - 'uucp' - cron.allow | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN003090 - Crontab files must not have extended ACLs - '/var/spool/cron' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN003110 - Cron and crontab directories must not have extended ACLs - '/etc/cron.daily' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN003110 - Cron and crontab directories must not have extended ACLs - '/etc/cron.monthly' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN003120 - Cron and crontab directories must be owned by root or bin - '/etc/cron.hourly' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN003120 - Cron and crontab directories must be owned by root or bin - '/etc/cron.weekly' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN003140 - Cron and crontab directories must be group-owned by root, sys, bin or cron - '/etc/crontab' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN003180 - The cronlog file must have mode 0600 or less permissive. | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN003190 - The cron log files must not have extended ACLs. | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN003220 - Cron programs must not set the umask to a value less restrictive than 077 - '/etc/cron.d/*' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN003220 - Cron programs must not set the umask to a value less restrictive than 077 - '/etc/cron.hourly/*' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN003250 - The cron.allow file must be group-owned by root, bin, sys, or cron. | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN003252 - The at.deny file must have mode 0600 or less permissive. | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN003320 - System accounts must not be listed in at.allow or must be included in at.deny - 'operator' - at.allow | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN003320 - System accounts must not be listed in at.allow or must be included in at.deny - 'uucp' - at.allow | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN003320 - System accounts must not be listed in at.allow or must be included in at.deny - 'uucp' - at.deny | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN003340 - The at.allow file must have mode 0600 or less permissive. | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN003380 - The 'at' daemon must not execute programs in, or subordinate to, world-writable directories. | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN003420 - The 'at' directory must be owned by root, bin, or sys. | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN003522 - The kernel core dump data directory must have mode 0700 or less permissive. | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN003740 - The xinetd.conf files must have mode 0640 or less permissive - '/etc/xinetd.d/*' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN003745 - The xinetd.conf files must not have extended ACLs. | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN003760 - The services file must be owned by root or bin. | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN003930 - The hosts.lpd (or equivalent) file must be group-owned by lp. | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN004010 - The traceroute file must not have an extended ACL. | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN004380 - The sendmail alias files must have mode 0644 or less permissive - '/etc/postfix/aliases.db' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN004380 - The sendmail alias files must have mode 0644 or less permissive - '/etc/postfix/aliases' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN004930 - The ftpusers file must be group-owned by root, bin, sys, or system - '/etc/ftpusers' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN004930 - The ftpusers file must be group-owned by root, bin, sys, or system - '/etc/vsftpd.ftpusers' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN004930 - The ftpusers file must be group-owned by root, bin, sys, or system - '/etc/vsftpd/ftpusers' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN004940 - The ftpusers file must have mode 0640 or less permissive - '/etc/vsftpd.ftpusers' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN004950 - The ftpusers file must not have an extended ACL - '/etc/ftpusers' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |