Skip to content

Access to database files must be limited to relevant processes and to authorized, administrative users.

An XCCDF Rule

Description

Developers and implementers can increase the assurance in security functions by employing well-defined security policy models; structured, disciplined, and rigorous hardware and software development techniques; and sound system/security engineering principles.

ID
SV-251247r961149_rule
Version
RD6X-00-011500
Severity
Medium
References
Updated

Remediation Templates

A Manual Procedure

Configure the operating system to define default permissions for all authenticated users in such a way that the user can only read and modify their own files.

Add or edit the line for the "UMASK" parameter in "/etc/login.defs" file to "077":

UMASK 077

Set the permissions of the log files (/var/opt/redislabs/log) and persisted files (/var/opt/redislabs/persist/redis/) to an appropriate organizationally defined setting.