...
FIO01-EX1: Files that do not contain privileged information need not be created with specific access permissions.
Risk Assessment
Files created with insufficiently restrictive access permissions result in If files are created without appropriate permissions, an attacker may read or write to the files. This could result in the compromise of system integrity and information disclosure.
Rule | Severity | Likelihood | Remediation Cost | Priority | Level |
|---|---|---|---|---|---|
FIO01-J | medium | probable | high | P4 | L3 |
...
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="1d9a91fc8fec70bd-a3eddd81-42d54d08-bc13ab66-1fd8a61c975e06bc48f8a229"><ac:plain-text-body><![CDATA[ | [ISO/IEC TR 24772:2010 | http://www.aitcnet.org/isai/] | Missing or Inconsistent Access Control [XZN] | ]]></ac:plain-text-body></ac:structured-macro> |
CWE-279. Incorrect execution-assigned permissions | ||||
| CWE-276. Incorrect default permissions | |||
| CWE-732. Incorrect permission assignment for critical resource |
...
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="6d7f8e23679c5872-76ed9135-40f24241-99d884e6-6306c14cdc37c1cc5f7cd89b"><ac:plain-text-body><![CDATA[ | [[API 2006 | AA. Bibliography#API 06]] |
| ]]></ac:plain-text-body></ac:structured-macro> |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="0f27803ea34ab1ab-cf8d2b0a-4336463b-b8a08af8-ca2639b68f8be90910ea9f69"><ac:plain-text-body><![CDATA[ | [[CVE | AA. Bibliography#CVE]] |
| ]]></ac:plain-text-body></ac:structured-macro> |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="ffa5a3b0e16d6d4d-d7e1f216-4497420c-9d4bb41c-1dfeeedefb6f112b250c80cc"><ac:plain-text-body><![CDATA[ | [[Dowd 2006 | AA. Bibliography#Dowd 06]] | Chapter 9, "UNIX 1: Privileges and Files" | ]]></ac:plain-text-body></ac:structured-macro> |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="3612de2ccad2d712-76926314-42124ece-82c49173-3285cef8fa5fc448616f76e1"><ac:plain-text-body><![CDATA[ | [[J2SE 2011 | AA. Bibliography#J2SE 11]] |
| ]]></ac:plain-text-body></ac:structured-macro> |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="6fbc964458f3a0bc-963c42fc-4e044b53-92a19206-f308f048c2c62e1b6d40e81f"><ac:plain-text-body><![CDATA[ | [[OpenBSD | AA. Bibliography#OpenBSD]] |
| ]]></ac:plain-text-body></ac:structured-macro> |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="6423ad8d73e7dd71-18c526a4-4dce4051-b7f8b5ce-334c28d3efd7fcc236c7f6db"><ac:plain-text-body><![CDATA[ | [[Open Group 2004 | AA. Bibliography#Open Group 04]] | "The | ]]></ac:plain-text-body></ac:structured-macro> |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="e8b5a7e2316d81f6-43be1d52-4be74c66-ab1e833c-90c087db6f4b7bd92228a9ee"><ac:plain-text-body><![CDATA[ | [[Viega 2003 | AA. Bibliography#Viega 03]] | Section 2.7, "Restricting Access Permissions for New Files on UNIX" | ]]></ac:plain-text-body></ac:structured-macro> |
...