S 4.22 Prevention of loss of confidentiality of sensitive data in the Unix system

Initiation responsibility: Head of IT, IT Security Officer

Implementation responsibility: Administrator

Unix commands such as ps, finger, who, last can be used to obtain information on a user (e.g. work habits). Additionally, many Unix derivatives contain further commands such as listusers in Solaris, for example. It must be considered whether every user should be allowed to execute these commands (data protection, spying of login names, and such like). In cases of doubt, access to these commands should be restricted.

When retrieving commands, no sensitive information may be entered as parameters, for example a password, since other users could read this information using ps.

If possible, the log files such as wtmp, utmp, wtmpx, utmpx, etc. should be protected against being read by unauthorised persons by appropriate access rights, since a good deal information about the users can be obtained from them.

Review questions: