The Photon operating system must be configured so the "/etc/skel" default scripts are protected from unauthorized modification.
Overview
Finding ID | Version | Rule ID | IA Controls | Severity |
V-256559 | PHTN-30-000090 | SV-256559r991589_rule | Medium |
Description |
If the skeleton files are not protected, unauthorized personnel could change user startup parameters and possibly jeopardize user files. |
STIG | Date |
VMware vSphere 7.0 vCenter Appliance Photon OS Security Technical Implementation Guide | 2024-12-16 |
Details
Check Text (C-60234r887349_chk) |
At the command line, run the following command: # stat -c "%n permissions are %a and owned by %U:%G" /etc/skel/.[^.]* Expected result: /etc/skel/.bash_logout permissions are 750 and owned by root:root /etc/skel/.bash_profile permissions are 644 and owned by root:root /etc/skel/.bashrc permissions are 750 and owned by root:root If the output does not match the expected result, this is a finding. |
Fix Text (F-60177r887350_fix) |
At the command line, run the following commands: # chmod 750 /etc/skel/.bash_logout # chmod 644 /etc/skel/.bash_profile # chmod 750 /etc/skel/.bashrc # chown root:root /etc/skel/.bash_logout # chown root:root /etc/skel/.bash_profile # chown root:root /etc/skel/.bashrc |