STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 4 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to SUSE Linux Enterprise Server v11 for System z Security Technical Implementation Guide

V-786

CAT II (Medium)

All network services daemon files must have mode 0755 or less permissive.

Rule ID

SV-44931r1_rule

STIG

SUSE Linux Enterprise Server v11 for System z Security Technical Implementation Guide

Version

V1R12

CCIs

CCI-000225

Discussion

Restricting permission on daemons will protect them from unauthorized modification and possible system compromise.

Check Content

Check the mode of network services daemons.
# find /usr/sbin -type f -perm +022 -exec stat -c %a:%n {} \;

This will return the octal permissions and name of all files that are group or world writable.
If any network services daemon listed is world or group writable (either or both of the 2 lowest order digits contain a 2, 3 or 6), this is a finding.
Note: Network daemons not residing in these directories (such as httpd or sshd) must also be checked for the correct permissions.

Fix Text

Change the mode of the network services daemon.
# chmod go-w <path>