UCF STIG Viewer Logo

The cron log files must not have extended ACLs.


Overview

Finding ID Version Rule ID IA Controls Severity
V-22388 GEN003190 SV-38361r1_rule ECTP-1 ECLP-1 Medium
Description
Cron logs contain reports of scheduled system activities and must be protected from unauthorized access or manipulation.
STIG Date
HP-UX 11.23 Security Technical Implementation Guide 2015-12-02

Details

Check Text ( C-36472r1_chk )
Check the permissions of the file.
# ls -lL /var/adm/cron/log

If the permissions include a "+" the file has an extended ACL, this is a finding.
Fix Text (F-31815r1_fix)
Remove the optional ACL from the file.
# chacl -z /var/adm/cron/log