UCF STIG Viewer Logo

The cron.deny file must not have an extended ACL.


Overview

Finding ID Version Rule ID IA Controls Severity
V-22389 GEN003210 SV-38362r1_rule ECLP-1 Medium
Description
If there are excessive file permissions for the cron.deny file, sensitive information could be viewed or edited by unauthorized users.
STIG Date
HP-UX 11.31 Security Technical Implementation Guide 2018-09-14

Details

Check Text ( C-36473r1_chk )
Check the permissions of the crontab files for an ACL.
# ls -lL /var/adm/cron/cron.deny

If the permissions include a "+" the file has an extended ACL, this is a finding.
Fix Text (F-31816r1_fix)
Remove the optional ACL from the file.
# chacl -z /var/adm/cron/cron.deny