UCF STIG Viewer Logo

Files in cron script directories must have mode 0700 or less permissive.


Overview

Finding ID Version Rule ID IA Controls Severity
V-29289 GEN003080-2 SV-37745r1_rule ECLP-1 Medium
Description
To protect the integrity of scheduled system jobs and prevent malicious modification to these jobs, crontab files must be secured.
STIG Date
Red Hat Enterprise Linux 5 Security Technical Implementation Guide 2017-03-01

Details

Check Text ( C-36943r1_chk )
Check the mode of scripts in cron job directories.
# ls -lL /etc/cron.daily/
# ls -lL /etc/cron.hourly/
# ls -lL /etc/cron.monthly/
# ls -lL /etc/cron.weekly/
If any cron script has a mode more permissive than 0700, this is a finding.
Fix Text (F-32208r1_fix)
Change the mode of the cron scripts.
# chmod 0700 /etc/cron.daily/* /etc/cron.hourly/* /etc/cron.monthly/* /etc/cron.weekly/*