UCF STIG Viewer Logo

Crontabs must be owned by root or the crontab creator.


Overview

Finding ID Version Rule ID IA Controls Severity
V-11994 GEN003040 SV-45585r1_rule Medium
Description
To protect the integrity of scheduled system jobs and prevent malicious modification to these jobs, crontab files must be secured.
STIG Date
SUSE Linux Enterprise Server v11 for System z Security Technical Implementation Guide 2018-09-19

Details

Check Text ( C-42938r1_chk )
List all crontabs on the system.

# ls -lL /var/spool/cron /var/spool/cron/tabs


# ls -lL /etc/crontab /etc/cron.{d,daily,hourly,monthly,weekly}
or
# ls -lL /etc/cron*|grep -v deny

If any crontab is not owned by root or the creating user, this is a finding
Fix Text (F-38981r1_fix)
Change the crontab owner to root or the crontab creator.

# chown root
or
# chown