Check: RHEL-09-232040
RHEL 9 STIG:
RHEL-09-232040
(in versions v2 r2 through v1 r1)
Title
RHEL 9 cron configuration directories must have a mode of 0700 or less permissive. (Cat II impact)
Discussion
Service configuration files enable or disable features of their respective services that if configured incorrectly can lead to insecure and vulnerable configurations. Therefore, service configuration files should have the correct access rights to prevent unauthorized changes.
Check Content
Verify the permissions of the cron directories with the following command: $ find /etc/cron* -type d | xargs stat -c "%a %n" 700 /etc/cron.d 700 /etc/cron.daily 700 /etc/cron.hourly 700 /etc/cron.monthly 700 /etc/cron.weekly If any cron configuration directory is more permissive than "700", this is a finding.
Fix Text
Configure any RHEL 9 cron configuration directory with a mode more permissive than "0700" as follows: chmod 0700 [cron configuration directory]
Additional Identifiers
Rule ID: SV-257888r991589_rule
Vulnerability ID: V-257888
Group Title: SRG-OS-000480-GPOS-00227
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000366 |
Implement the security configuration settings. |
Controls
Number | Title |
---|---|
CM-6 |
Configuration Settings |