Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-22385 | GEN003050 | SV-37400r1_rule | ECLP-1 | Medium |
Description |
---|
To protect the integrity of scheduled system jobs and prevent malicious modification to these jobs, crontab files must be secured. |
STIG | Date |
---|---|
Red Hat Enterprise Linux 5 Security Technical Implementation Guide | 2014-01-09 |
Check Text ( C-36079r1_chk ) |
---|
Check the group ownership of the crontab files. Procedure: # ls -lL /var/spool/cron # ls -lL /etc/cron.d /etc/crontab /etc/cron.daily /etc/cron.hourly /etc/cron.monthly /etc/cron.weekly or # ls -lL /etc/cron*|grep -v deny If the group owner is not root or the crontab owner's primary group, this is a finding. |
Fix Text (F-31323r1_fix) |
---|
Change the group owner of the crontab file to root, cron, or the crontab's primary group. Procedure: # chgrp root [crontab file] |