STIGQter: STIG Summary: Solaris 10 X86 Security Technical Implementation Guide Version: 1 Release: 26 Benchmark Date: 24 Jan 2020: The smbpasswd file must be owned by root.DISA Rule
SV-40284r1_rule
Vulnerability Number
V-1029
Group Title
GEN006160
Rule Version
GEN006160
Severity
CAT II
CCI(s)
- CCI-000225 - The organization employs the concept of least privilege, allowing only authorized accesses for users (and processes acting on behalf of users) which are necessary to accomplish assigned tasks in accordance with organizational missions and business functions.
Weight
10
Fix Recommendation
Use the chown command to configure the smb passwd file.
# chown root /etc/sfw/private/smbpasswd
Check Contents
Check the ownership of the smbpasswd file.
# ls -lL /etc/sfw/private/smbpasswd
If the smbpasswd file is not owned by root, this is a finding.
Vulnerability Number
V-1029
Documentable
False
Rule Version
GEN006160
Severity Override Guidance
Check the ownership of the smbpasswd file.
# ls -lL /etc/sfw/private/smbpasswd
If the smbpasswd file is not owned by root, this is a finding.
Check Content Reference
M
Responsibility
System Administrator
Target Key
25
Comments