STIGQter STIGQter: STIG Summary: Canonical Ubuntu 16.04 Security Technical Implementation Guide Version: 1 Release: 3 Benchmark Date: 24 Jan 2020: Default permissions must be defined in such a way that all authenticated users can only read and modify their own files.

DISA Rule

SV-90223r2_rule

Vulnerability Number

V-75543

Group Title

SRG-OS-000480-GPOS-00228

Rule Version

UBTU-16-010640

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure the system to define the default permissions for all authenticated users in such a way that the user can only read and modify their own files.

Edit the "UMASK" parameter in the "/etc/login.defs" file to match the example below:

UMASK 077

Check Contents

Verify the Ubuntu operating system defines default permissions for all authenticated users in such a way that the user can only read and modify their own files.

Check that the Ubuntu operating system defines default permissions for all authenticated users with the following command:

# grep -i "umask" /etc/login.defs

UMASK 077

If the "UMASK" variable is set to "000", this is a finding with the severity raised to a CAT I.

If the value of "UMASK" is not set to "077", "UMASK" is commented out or "UMASK" is missing completely, this is a finding.

Vulnerability Number

V-75543

Documentable

False

Rule Version

UBTU-16-010640

Severity Override Guidance

Verify the Ubuntu operating system defines default permissions for all authenticated users in such a way that the user can only read and modify their own files.

Check that the Ubuntu operating system defines default permissions for all authenticated users with the following command:

# grep -i "umask" /etc/login.defs

UMASK 077

If the "UMASK" variable is set to "000", this is a finding with the severity raised to a CAT I.

If the value of "UMASK" is not set to "077", "UMASK" is commented out or "UMASK" is missing completely, this is a finding.

Check Content Reference

M

Target Key

3075

Comments