STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 1 hour ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to IBM AIX 7.x Security Technical Implementation Guide

V-215431

CAT II (Medium)

AIX must define default permissions for all authenticated users in such a way that the user can only read and modify their own files.

Rule ID

SV-215431r991590_rule

STIG

IBM AIX 7.x Security Technical Implementation Guide

Version

V3R2

CCIs

CCI-000366

Discussion

Setting the most restrictive default permissions ensures that when new accounts are created they do not have unnecessary access.

Check Content

Check if "/etc/security/.profile" contains the proper "umask" setting by running the following command:
# grep "umask 077" /etc/security/.profile
umask 077

If the above command does not output the "umask 077", this is a finding.

From the command prompt, run the following command to check if "umask=077" for the default stanza in "/etc/security/user":
# lssec -f /etc/security/user -s default -a umask
default umask=077

If the "umask" for the default stanza is not "077", or the "umask" is not set, this is a finding.

Fix Text

Add the following line to "/etc/security/.profile":
umask 077

Run the following command to set "umask=077" for the default stanza in "/etc/security/user":
# chsec -f /etc/security/user -s default -a umask=077