UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Access to the cron utility must be controlled using the cron.allow and/or cron.deny file(s).


Overview

Finding ID Version Rule ID IA Controls Severity
GEN002960-ESXI5-PNF GEN002960-ESXI5-PNF GEN002960-ESXI5-PNF_rule Medium
Description
The cron facility allows users to execute recurring jobs on a regular and unattended basis. The cron.allow file designates accounts that are allowed to enter and execute jobs using the cron facility. If neither cron.allow nor cron.deny exists, then any account may use the cron facility. This may open the facility up for abuse by system intruders and malicious users. Applicable, but permanent not-a-finding - Root is the only user local to the host. root (name) is the default administrator w/full access. Additional AD accounts are also administrator accounts with full access, read-only access, or no access. allow and/or deny files are therefore Applicable, but permanent not-a-finding.
STIG Date
VMware ESXi v5 Security Technical Implementation Guide 2013-01-15

Details

Check Text ( C-GEN002960-ESXI5-PNF_chk )
ESXi supports this requirement and cannot be configured to be out of compliance. This is a permanent not a finding.
Fix Text (F-GEN002960-ESXI5-PNF_fix)
This requirement is permanent not a finding. No fix is required.