STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 1 hour ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to IBM AIX 7.x Security Technical Implementation Guide

V-215184

CAT II (Medium)

AIX device files and directories must only be writable by users with a system account or as configured by the vendor.

Rule ID

SV-215184r991560_rule

STIG

IBM AIX 7.x Security Technical Implementation Guide

Version

V3R2

CCIs

CCI-001499

Discussion

System device files in writable directories could be modified, removed, or used by an unprivileged user to control system hardware.

Check Content

Find all device files existing anywhere on the system using commands:
# find / -type b -print | xargs ls -l > devicelistB
# find / -type c -print | xargs ls -l > devicelistC 

Look at devicelistB and devicelistC files to check the permissions on the device files and directories above the subdirectories containing device files.

If any of the device files or their parent directories are world-writable, excepting device files specifically intended to be world-writable, such as "/dev/null", this is a finding.

Fix Text

Remove the world-writable permission from the device file(s) using command:
# chmod o-w <device file>