STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to IBM Aspera Platform 4.2 Security Technical Implementation Guide

V-252646

CAT II (Medium)

The IBM Aspera High-Speed Transfer Server private/secret cryptographic keys file must be group-owned by root to prevent unauthorized read access.

Rule ID

SV-252646r831532_rule

STIG

IBM Aspera Platform 4.2 Security Technical Implementation Guide

Version

V1R3

CCIs

CCI-002165

Discussion

Private key data is used to prove that the entity presenting a public key certificate is the certificate's rightful owner. Compromise of private key data allows an adversary to impersonate the key holder. The rootkeystore.db functions as a backup and main source of truth for encrypted secrets.

Check Content

Verify the rootkeystore.db file is group-owned by root with the following command:

$ sudo stat -c "%G" /opt/aspera/etc/rootkeystore.db

root

If "root" is not returned as a result, this is a finding.

Fix Text

Configure the rootkeystore.db file to be group-owned by root with the following command:

$ sudo chgrp root /opt/aspera/etc/rootkeystore.db