DISA STIGS Viewer

RHEL 9 cron configuration files directory must be owned by root.

Overview

Finding ID Version Rule ID IA Controls Severity
V-257926 RHEL-09-232230 SV-257926r991589_rule   Medium
Description
Service configuration files enable or disable features of their respective services that if configured incorrectly can lead to insecure and vulnerable configurations; therefore, service configuration files must be owned by the correct group to prevent unauthorized changes.
STIG Date
Red Hat Enterprise Linux 9 Security Technical Implementation Guide 2024-12-04

Details

Check Text (C-61667r925763_chk)
Verify the ownership of all cron configuration files with the command:

$ stat -c "%U %n" /etc/cron*

root /etc/cron.d
root /etc/cron.daily
root /etc/cron.deny
root /etc/cron.hourly
root /etc/cron.monthly
root /etc/crontab
root /etc/cron.weekly

If any crontab is not owned by root, this is a finding.
Fix Text (F-61591r925764_fix)
Configure any cron configuration not owned by root with the following command:

$ sudo chown root [cron config file]