STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 6 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to SLES 12 Security Technical Implementation Guide

V-217175

CAT II (Medium)

All SUSE operating system local initialization files must have mode 0740 or less permissive.

Rule ID

SV-217175r991589_rule

STIG

SLES 12 Security Technical Implementation Guide

Version

V3R2

CCIs

SV-91911

Discussion

Local initialization files are used to configure the user's shell environment upon logon. Malicious modification of these files could compromise accounts upon logon.

Check Content

Verify that all SUSE operating system local initialization files have a mode of "0740" or less permissive.

Check the mode on all SUSE operating system local initialization files with the following command:

Note: The example will be for the user "smithj", who has a home directory of "/home/smithj".

# ls -al /home/smithj/.* | more
-rwxr-xr-x  1 smithj users   896 Mar 10  2011 .profile
-rwxr-xr-x  1 smithj users   497 Jan  6  2007 .login
-rwxr-xr-x  1 smithj users   886 Jan  6  2007 .something

If any local initialization files have a mode more permissive than "0740", this is a finding.

Fix Text

Set the mode of SUSE operating system local initialization files to "0740" with the following command:

Note: The example will be for the smithj user, who has a home directory of "/home/smithj".

# chmod 0740 /home/smithj/.<INIT_FILE>