STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to SUSE Linux Enterprise Micro (SLEM) 5 Security Technical Implementation Guide

V-261404

CAT II (Medium)

SLEM 5 file integrity tool must be configured to verify Access Control Lists (ACLs).

Rule ID

SV-261404r996629_rule

STIG

SUSE Linux Enterprise Micro (SLEM) 5 Security Technical Implementation Guide

Version

V1R4

CCIs

CCI-000366

Discussion

ACLs can provide permissions beyond those permitted through the file mode and must be verified by file integrity tools.

Check Content

Verify that SLEM 5 file integrity tool is configured to verify extended attributes.

     > sudo grep acl /etc/aide.conf
     All= p+i+n+u+g+s+m+S+sha512+acl+xattrs+selinux

If the "acl" rule is not being used on all selection lines in the "/etc/aide.conf" file, or extended attributes are not being checked by another file integrity tool, this is a finding.

Fix Text

Configure SLEM 5 file integrity tool to check file and directory ACLs.

If AIDE is installed, ensure the "acl" rule is present on all file and directory selection lists.