UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The at.allow file must be group-owned by root, bin, sys, or cron.


Overview

Finding ID Version Rule ID IA Controls Severity
GEN003470-ESXI5-PNF GEN003470-ESXI5-PNF GEN003470-ESXI5-PNF_rule Medium
Description
If the group owner of the at.allow file is not set to root, bin, sys, or cron, unauthorized users could be allowed to view or edit the list of users permitted to run "at" jobs. Unauthorized modification could result in Denial-of-Service to authorized "at" users or provide unauthorized users with the ability to run "at" jobs. Applicable, but permanent not-a-finding - The hypervisor does not support this function.
STIG Date
VMware ESXi v5 Security Technical Implementation Guide 2013-01-15

Details

Check Text ( C-GEN003470-ESXI5-PNF_chk )
ESXi supports this requirement and cannot be configured to be out of compliance. This is a permanent not a finding.
Fix Text (F-GEN003470-ESXI5-PNF_fix)
This requirement is permanent not a finding. No fix is required.