STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide

V-269276

CAT II (Medium)

All AlmaLinux OS 9 local initialization files must have mode 0740 or less permissive.

Rule ID

SV-269276r1050158_rule

STIG

Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide

Version

V1R6

CCIs

CCI-000366

Discussion

Local initialization files are used to configure the user's shell environment upon logon. Malicious modification of these files could compromise accounts upon logon. World-readable "dot files" such as .bash_history or .netrc can reveal plaintext credentials, such files should be further protected (e.g., 0600).

Check Content

Verify that all local initialization files have a mode of "0740" or less permissive with the following command:

Note: The example will be for the "testuser" account, who has a home directory of "/home/testuser".

$ find /home/testuser/.[^.]* -maxdepth 0 -perm -740 -exec stat -c "%a %n" {} \; | more

755 /home/testuser/.cache
755 /home/testuser/.mozilla

If any local initialization files have a mode more permissive than "0740", this is a finding.

Fix Text

Set the mode of the local initialization files to "0740" with the following command:

Note: The example will be for the "testuser" account, who has a home directory of "/home/testuser".

$ chmod 0740 /home/testuser/.<INIT_FILE>