Access to database files must be limited to relevant processes and to authorized, administrative users.
An XCCDF Rule
Description
Developers and implementers can increase the assurance in security functions by employing well-defined security policy models; structured, disciplined, and rigorous hardware and software development techniques; and sound system/security engineering principles.
- ID
- SV-251247r961149_rule
- Version
- RD6X-00-011500
- Severity
- Medium
- References
- Updated
Remediation Templates
A Manual Procedure
Configure the operating system to define default permissions for all authenticated users in such a way that the user can only read and modify their own files.
Add or edit the line for the "UMASK" parameter in "/etc/login.defs" file to "077":
UMASK 077
Set the permissions of the log files (/var/opt/redislabs/log) and persisted files (/var/opt/redislabs/persist/redis/) to an appropriate organizationally defined setting.