UCF STIG Viewer Logo

The cronlog file must have mode 0600 or less permissive.


Overview

Finding ID Version Rule ID IA Controls Severity
V-983 GEN003180 SV-45619r1_rule Medium
Description
Cron logs contain reports of scheduled system activities and must be protected from unauthorized access or manipulation.
STIG Date
SUSE Linux Enterprise Server v11 for System z Security Technical Implementation Guide 2018-09-19

Details

Check Text ( C-42985r1_chk )
Check the mode of the cron log file.

Procedure:

Check the configured cron log file found in the cron entry of the rsyslog configuration (normally /var/log/cron).
# grep cron /etc/rsyslog.conf /etc/rsyslog.d/*.conf
# ls -lL /var/log/cron

If the mode is more permissive than 0600, this is a finding.
Fix Text (F-39017r1_fix)
Change the mode of the cron log file.
# chmod 0600 /var/log/cron