UCF STIG Viewer Logo

Crontab files must be group-owned by root, cron, or the crontab creator's primary group.


Overview

Finding ID Version Rule ID IA Controls Severity
V-22385 GEN003050 SV-37400r1_rule ECLP-1 Medium
Description
To protect the integrity of scheduled system jobs and prevent malicious modification to these jobs, crontab files must be secured.
STIG Date
Red Hat Enterprise Linux 5 Security Technical Implementation Guide 2017-03-01

Details

Check Text ( C-36079r1_chk )
Check the group ownership of the crontab files.
Procedure:

# ls -lL /var/spool/cron

# ls -lL /etc/cron.d /etc/crontab /etc/cron.daily /etc/cron.hourly /etc/cron.monthly /etc/cron.weekly
or
# ls -lL /etc/cron*|grep -v deny

If the group owner is not root or the crontab owner's primary group, this is a finding.
Fix Text (F-31323r1_fix)
Change the group owner of the crontab file to root, cron, or the crontab's primary group.
Procedure:
# chgrp root [crontab file]