Check: GEN003120
SUSE Linux Enterprise Server v11 for System z STIG:
GEN003120
(in versions v1 r12 through v1 r9)
Title
Cron and crontab directories must be owned by root or bin. (Cat II impact)
Discussion
Incorrect ownership of the cron or crontab directories could permit unauthorized users the ability to alter cron jobs and run automated jobs as privileged users. Failure to give ownership of cron or crontab directories to root or to bin provides the designated owner and unauthorized users with the potential to access sensitive information or change the system configuration which could weaken the system's security posture.
Check Content
Check the owner of the crontab directories. Procedure: # ls -ld /var/spool/cron /var/spool/cron/tabs ls -ld /etc/crontab /etc/cron.{d,daily,hourly,monthly,weekly} or # ls -ld /etc/cron*|grep -v deny If the owner of any of the crontab directories is not root or bin, this is a finding.
Fix Text
Change the mode of the crontab directories. # chown root <crontab directory>
Additional Identifiers
Rule ID: SV-45604r1_rule
Vulnerability ID: V-980
Group Title: GEN003120
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000225 |
The organization employs the concept of least privilege, allowing only authorized accesses for users (and processes acting on behalf of users) which are necessary to accomplish assigned tasks in accordance with organizational missions and business functions. |
Controls
Number | Title |
---|---|
AC-6 |
Least Privilege |