STIGQter STIGQter: STIG Summary: IBM AIX 7.x Security Technical Implementation Guide Version: 2 Release: 2 Benchmark Date: 23 Apr 2021:

All AIX files and directories must have a valid owner.

DISA Rule

SV-215340r508663_rule

Vulnerability Number

V-215340

Group Title

SRG-OS-000480-GPOS-00227

Rule Version

AIX7-00-003034

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

All directories and files (executable and data) will have an identifiable owner and group name. Either trace files to an authorized user, change the file's owner to "root", or delete them. Determine the legitimate owner of the files and use the "chown" command to set the owner and group to the correct value. If the legitimate owner cannot be determined, change the owner to "root" (but make sure none of the changed files remain executable because they could be trojan horses or other malicious code). Examine the files to determine their origin and the reason for their lack of an owner/group.

From the command prompt, run the following command to set the owner and/or group on a file:
# chown <a-valid-user>.<a-valid-group> <directory>/<file>

Check Contents

Check the system for files with no assigned owner using the following command:
# find / -nouser -print

If any files have no assigned owner, this is a finding.

Vulnerability Number

V-215340

Documentable

False

Rule Version

AIX7-00-003034

Severity Override Guidance

Check the system for files with no assigned owner using the following command:
# find / -nouser -print

If any files have no assigned owner, this is a finding.

Check Content Reference

M

Target Key

4012

Comments