STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to SUSE Linux Enterprise Micro (SLEM) 5 Security Technical Implementation Guide

V-261349

CAT II (Medium)

SLEM 5 default permissions must be defined in such a way that all authenticated users can only read and modify their own files.

Rule ID

SV-261349r996502_rule

STIG

SUSE Linux Enterprise Micro (SLEM) 5 Security Technical Implementation Guide

Version

V1R4

CCIs

CCI-000366

Discussion

Setting the most restrictive default permissions ensures that when new accounts are created, they do not have unnecessary access.

Check Content

Verify SLEM 5 defines default permissions for all authenticated users in such a way that the users can only read and modify their own files with the following command:
 
     > grep -i "^umask" /etc/login.defs
     UMASK 077

If the "UMASK" variable is set to "000", the severity is raised to a CAT I and this is a finding.

If the value of "UMASK" is not set to "077", the line is commented out, or the line is missing, this is a finding.

Fix Text

Configure SLEM 5 to define the default permissions for all authenticated users in such a way that the users can only read and modify their own files.

Add or modify the following line in the "/etc/login.defs" file:

UMASK 077