Check: GEN003040
SUSE Linux Enterprise Server v11 for System z STIG:
GEN003040
(in versions v1 r12 through v1 r9)
Title
Crontabs must be owned by root or the crontab creator. (Cat II impact)
Discussion
To protect the integrity of scheduled system jobs and prevent malicious modification to these jobs, crontab files must be secured.
Check Content
List all crontabs on the system. # ls -lL /var/spool/cron /var/spool/cron/tabs # ls -lL /etc/crontab /etc/cron.{d,daily,hourly,monthly,weekly} or # ls -lL /etc/cron*|grep -v deny If any crontab is not owned by root or the creating user, this is a finding
Fix Text
Change the crontab owner to root or the crontab creator. # chown root <crontab file> or # chown <user> <crontab file>
Additional Identifiers
Rule ID: SV-45585r1_rule
Vulnerability ID: V-11994
Group Title: GEN003040
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000225 |
The organization employs the concept of least privilege, allowing only authorized accesses for users (and processes acting on behalf of users) which are necessary to accomplish assigned tasks in accordance with organizational missions and business functions. |
Controls
Number | Title |
---|---|
AC-6 |
Least Privilege |