UCF STIG Viewer Logo

RHEL 8 must define default permissions for all authenticated users in such a way that the user can only read and modify their own files.


Overview

Finding ID Version Rule ID IA Controls Severity
V-230383 RHEL-08-020351 SV-230383r627750_rule Medium
Description
Setting the most restrictive default permissions ensures that when new accounts are created, they do not have unnecessary access.
STIG Date
Red Hat Enterprise Linux 8 Security Technical Implementation Guide 2022-09-07

Details

Check Text ( C-33052r567895_chk )
Verify the operating system defines default permissions for all authenticated users in such a way that the user can only read and modify their own files.

Check for the value of the "UMASK" parameter in "/etc/login.defs" file with the following command:

Note: If the value of the "UMASK" parameter is set to "000" in "/etc/login.defs" file, the Severity is raised to a CAT I.

# grep -i umask /etc/login.defs

UMASK 077

If the value for the "UMASK" parameter is not "077", or the "UMASK" parameter is missing or is commented out, this is a finding.
Fix Text (F-33027r567896_fix)
Configure the operating system to define default permissions for all authenticated users in such a way that the user can only read and modify their own files.

Add or edit the line for the "UMASK" parameter in "/etc/login.defs" file to "077":

UMASK 077