STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to VMware vRealize Automation 7.x SLES Security Technical Implementation Guide

V-240551

CAT II (Medium)

The SLES for vRealize must define default permissions for all authenticated users in such a way that the user can only read and modify their own files.

Rule ID

SV-240551r671394_rule

STIG

VMware vRealize Automation 7.x SLES Security Technical Implementation Guide

Version

V2R2

CCIs

CCI-000366

Discussion

Setting the most restrictive default permissions ensures that when new accounts are created they do not have unnecessary access.

Check Content

Check for the configured "umask" value in "login.defs" with the following command:

# grep UMASK /etc/login.defs

If the default "umask" is not "077", this a finding.

Note: If the default umask is "000" or allows for the creation of world-writable files this becomes a Severity Code I finding.

Fix Text

To configure the correct UMASK setting run the following command:

# sed -i "/^[^#]*UMASK/ c\UMASK 077" /etc/login.defs