Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-257926 | RHEL-09-232230 | SV-257926r991589_rule | Medium |
Description |
---|
Service configuration files enable or disable features of their respective services that if configured incorrectly can lead to insecure and vulnerable configurations; therefore, service configuration files must be owned by the correct group to prevent unauthorized changes. |
STIG | Date |
---|---|
Red Hat Enterprise Linux 9 Security Technical Implementation Guide | 2024-06-04 |
Check Text ( C-61667r925763_chk ) |
---|
Verify the ownership of all cron configuration files with the command: $ stat -c "%U %n" /etc/cron* root /etc/cron.d root /etc/cron.daily root /etc/cron.deny root /etc/cron.hourly root /etc/cron.monthly root /etc/crontab root /etc/cron.weekly If any crontab is not owned by root, this is a finding. |
Fix Text (F-61591r925764_fix) |
---|
Configure any cron configuration not owned by root with the following command: $ sudo chown root [cron config file] |