Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-981 | GEN003140 | SV-64305r1_rule | ECLP-1 | Medium |
Description |
---|
To protect the integrity of scheduled system jobs and to prevent malicious modification to these jobs, crontab files must be secured. Failure to give group-ownership of cron or crontab directories to a system group provides the designated group and unauthorized users with the potential to access sensitive information or change the system configuration which could weaken the system's security posture. |
STIG | Date |
---|---|
Oracle Linux 5 Security Technical Implementation Guide | 2015-03-26 |
Check Text ( C-52729r2_chk ) |
---|
Check the group owner of cron and crontab directories. Procedure: # ls -ld /var/spool/cron # ls -ld /etc/cron.d /etc/crontab /etc/cron.daily /etc/cron.hourly /etc/cron.monthly /etc/cron.weekly or # ls -ld /etc/cron*|grep -v deny If a directory is not group-owned by root, sys, bin, or cron, this is a finding. |
Fix Text (F-54897r2_fix) |
---|
Change the group owner of cron and crontab directories. # chgrp root |