Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-982 | GEN003160 | SV-27352r2_rule | ECAR-2 ECAR-3 ECAR-1 | Medium |
Description |
---|
Cron logging can be used to trace the successful or unsuccessful execution of cron jobs. It can also be used to spot intrusions into the use of the cron facility by unauthorized and malicious users. |
STIG | Date |
---|---|
Red Hat Enterprise Linux 5 Security Technical Implementation Guide | 2015-09-03 |
Check Text ( None ) |
---|
None |
Fix Text (F-31389r2_fix) |
---|
Edit /etc/syslog.conf or /etc/rsyslog.conf and setup cron logging |