STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 1 hour ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to IBM Aspera Platform 4.2 Security Technical Implementation Guide

V-252573

CAT II (Medium)

The IBM Aspera Console private/secret cryptographic keys file must have a mode of 0600 or less permissive to prevent unauthorized read access.

Rule ID

SV-252573r831498_rule

STIG

IBM Aspera Platform 4.2 Security Technical Implementation Guide

Version

V1R3

CCIs

CCI-002165

Discussion

Private key data is used to prove that the entity presenting a public key certificate is the certificate's rightful owner. Compromise of private key data allows an adversary to impersonate the key holder.

Check Content

Verify the /opt/aspera/console/config/secret.yml file has a mode of "0600" or less permissive with the following command:

$ sudo stat -c "%a %n" /opt/aspera/console/config/secret.yml

600 /opt/aspera/console/config/secret.yml

If the resulting mode is more permissive than "0600", this is a finding.

Fix Text

Configure the /opt/aspera/console/config/secret.yml file to have a mode of "0600" or less permissive with the following command:

$ sudo chmod 0600 /opt/aspera/console/config/secret.yml