UCF STIG Viewer Logo

The cron log files must not have extended ACLs.


Overview

Finding ID Version Rule ID IA Controls Severity
V-22388 GEN003190 SV-26038r1_rule ECLP-1 ECTP-1 Medium
Description
Cron logs contain reports of scheduled system activities and must be protected from unauthorized access or manipulation.
STIG Date
UNIX SRG 2013-03-26

Details

Check Text ( C-29219r1_chk )
Determine if the cron log file has an extended ACL. If it does, this is a finding.
Fix Text (F-26240r1_fix)
Remove the extended ACL from the cron log file.