STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to SUSE Linux Enterprise Server v11 for System z Security Technical Implementation Guide

V-785

CAT II (Medium)

All files and directories must have a valid owner.

Rule ID

SV-44926r1_rule

STIG

SUSE Linux Enterprise Server v11 for System z Security Technical Implementation Guide

Version

V1R12

CCIs

CCI-000366

Discussion

Un-owned files and directories may be unintentionally inherited if a user is assigned the same UID as the UID of the un-owned files.

Check Content

Check the system for files with no assigned owner.

Procedure:
# find / -nouser 

If any files have no assigned owner, this is a finding.

Caution should be used when centralized authorization is used because valid files may appear as unowned due to communication issues.

Fix Text

All directories and files (executable and data) will have an identifiable owner and group name. Either trace files to an authorized user, change the file’s owner to root, or delete them. Determine the legitimate owner of the files and use the chown command to set the owner and group to the correct value. If the legitimate owner cannot be determined, change the owner to root (but make sure none of the changed files remain executable because they could be Trojan horses or other malicious code). Examine the files to determine their origin and the reason for their lack of an owner/group.