All valid SUID/SGID files must be documented.
An XCCDF Rule
Description
<VulnDiscussion>There are valid reasons for SUID/SGID programs, but it is important to identify and review such programs to ensure they are legitimate.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>
- ID
- SV-216435r603267_rule
- Severity
- Low
- References
- Updated
Remediation - Manual Procedure
The root role is required.
Determine the existence of any set-UID programs that do not belong on the system, and work with the owners (or system administrator) to determine the best course of action in accordance with site policy.