UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Files in cron script directories must have mode 0700 or less permissive.


Overview

Finding ID Version Rule ID IA Controls Severity
V-29289 GEN003080-2 SV-37745r1_rule ECLP-1 Medium
Description
To protect the integrity of scheduled system jobs and prevent malicious modification to these jobs, crontab files must be secured.
STIG Date
Red Hat Enterprise Linux 5 Security Technical Implementation Guide 2015-03-12

Details

Check Text ( C-36943r1_chk )
Check the mode of scripts in cron job directories.
# ls -lL /etc/cron.daily/
# ls -lL /etc/cron.hourly/
# ls -lL /etc/cron.monthly/
# ls -lL /etc/cron.weekly/
If any cron script has a mode more permissive than 0700, this is a finding.
Fix Text (F-32208r1_fix)
Change the mode of the cron scripts.
# chmod 0700 /etc/cron.daily/* /etc/cron.hourly/* /etc/cron.monthly/* /etc/cron.weekly/*