System start-up files must only execute programs owned by a privileged UID or an application.
Overview
| Finding ID | Version | Rule ID | IA Controls | Severity |
| V-216072 | SOL-11.1-020380 | SV-216072r959010_rule | CCI-000366 | medium |
| Description | ||||
| System start-up files executing programs owned by other than root (or another privileged user) or an application indicates the system may have been compromised. | ||||
| STIG | Date | |||
| Solaris 11 X86 Security Technical Implementation Guide | 2025-05-05 | |||
Details
Check Text (C-216072r959010_chk)
Determine the programs executed by system start-up files. Determine the ownership of the executed programs.
# cat /etc/rc* /etc/init.d/* | more
Check the ownership of every program executed by the system start-up files.
# ls -l <executed program>
If any executed program is not owned by root, sys, bin, or in rare cases, an application account, this is a finding.
Fix Text (F-17308r372599_fix)
Change the ownership of the file executed from system startup scripts to root, bin, or sys.
# chown root <executed file>