This is an IBM Automation portal for Cloud Management, Technology Cost Management, Network Automation and AIOps products. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).
We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:
Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updates on them if they matter to you. If you can't find what you are looking for,
Post an idea.
Get feedback from the IBM team and other customers to refine your idea.
Follow the idea through the IBM Ideas process.
Welcome to the IBM Ideas Portal (https://www.ibm.com/ideas) - Use this site to find out additional information and details about the IBM Ideas process and statuses.
IBM Unified Ideas Portal (https://ideas.ibm.com) - Use this site to view all of your ideas, create new ideas for any IBM product, or search for ideas across all of IBM.
ideasibm@us.ibm.com - Use this email to suggest enhancements to the Ideas process or request help from IBM for submitting your Ideas.
See this idea on ideas.ibm.com
Our security policy does not accept files with permission to write and execute inside the directory "/tmp", as INSTANA creates this type of file in "/tmp/.instana" we have several issues of vulnerability. We verified in the Instana documentation that these files cannot be removed, we also tried to change their permissions but every time the Instana agent is restarted it returns to the original permissions with (read, write and execute) we would like these files to keep only permission to read, even after restarting the Instana agent.
As per the IBM's ITSS for Linux Redhat v7/8 servers is not allowed to use word-writable files and it’s considered as a security deviation (Section IZ.1.8.22.4, "Protecting Resources - non-OSRs"). But, if you can remove the “write for all” from that file that won’t be a deviation (it might not to be really needed to have write access to that jar file for all users). Basically just 777 and 776 permissions are not allowed.
Also you can take a look at the sticky bit configuration for directories with world-writable access - it might be useful:
More details about the TechSpec for Linux in this link: https://ibm.box.com/s/sb017bgb8o8sdcwpr8uih96pzs46jfovMain Tech Spec web: https://w3.ibm.com/ocean/w3publisher/gts-technical-specifications/technical-specifications/sponsored
Slack Support Channel for TechSpec Linux: https://kyndryl.slack.com/archives/C028DSC60MC
By clicking the "Post Comment" or "Submit Idea" button, you are agreeing to the IBM Ideas Portal Terms of Use.
Do not place IBM confidential, company confidential, or personal information into any field.
This is still an issue. Please take a look.
The files in /tmp/.instana created with 777 permissions cause failures in our Tenable compliance scans
Ensure no world writable files exist
CIS Red Hat Enterprise Linux 7 Benchmark v3.1.1
Source: Tenable Security Center"6.1.10 Ensure no world writable files exist" : [FAILED]
Unix-based systems support variable settings to control access to files. World writable files are the least secure. See the chmod(2) man page for more information.
Rationale:
Data in world-writable files can be modified and compromised by any user on the system. World writable files may also indicate an incorrectly written script or program that could potentially be the cause of a larger compromise to the system's integrity.
Solution:
Removing write access for the 'other' category ( chmod o-w ) is advisable, but always consult relevant vendor documentation to avoid breaking any application dependencies on a given file.
See Also: https://workbench.cisecurity.org/files/3393
Reference: 800-171|3.1.5,800-53|AC-6,CIS_Recommendation|6.1.10,CN-L3|7.1.3.2(b),CN-L3|7.1.3.2(g),CN-L3|8.1.4.2(d),CN-L3|8.1.10.6(a),CSCv7|5.1,CSCv8|3.3,CSCv8|4.1,CSF|PR.AC-4,CSF|PR.DS-5,ITSG-33|AC-6,LEVEL|1A,NESA|T5.1.1,NESA|T5.2.2,NESA|T5.4.1,NESA|T5.4.4,NESA|T5.4.5,NESA|T5.5.4,NESA|T5.6.1,NESA|T7.5.3,NIAv2|AM1,NIAv2|AM23f,NIAv2|SS13c,NIAv2|SS15c,PCI-DSSv3.1|7.1.2,PCI-DSSv3.2|7.1.2,QCSC-v1|5.2.2,QCSC-v1|6.2,QCSC-v1|13.2,SWIFT-CSCv1|5.1,TBA-FIISB|31.4.2,TBA-FIISB|31.4.3
Tenable CIS Red Hat Enterprise Linux Benchmark security scans report failures for
"6.1.10 Ensure no world writable files exist" : [FAILED]
Rationale:
Data in world-writable files can be modified and compromised by any user on the system. World writable files may also indicate an incorrectly written script or program that could potentially be the cause of a larger compromise to the system's integrity.
See Also: https://workbench.cisecurity.org/files/3393
Reference: 800-171|3.1.5,800-53|AC-6,CIS_Recommendation|6.1.10,CN-L3|7.1.3.2(b),CN-L3|7.1.3.2(g),CN-L3|8.1.4.2(d),CN-L3|8.1.10.6(a),CSCv7|5.1,CSCv8|3.3,CSCv8|4.1,CSF|PR.AC-4,CSF|PR.DS-5,ITSG-33|AC-6,LEVEL|1A,NESA|T5.1.1,NESA|T5.2.2,NESA|T5.4.1,NESA|T5.4.4,NESA|T5.4.5,NESA|T5.5.4,NESA|T5.6.1,NESA|T7.5.3,NIAv2|AM1,NIAv2|AM23f,NIAv2|SS13c,NIAv2|SS15c,PCI-DSSv3.1|7.1.2,PCI-DSSv3.2|7.1.2,QCSC-v1|5.2.2,QCSC-v1|6.2,QCSC-v1|13.2,SWIFT-CSCv1|5.1,TBA-FIISB|31.4.2,TBA-FIISB|31.4.3