Check: PHTN-67-000103
VMware vSphere 6.7 Photon OS STIG:
PHTN-67-000103
(in versions v1 r6 through v1 r1)
Title
The Photon operating system must be configured so that all cron paths are protected from unauthorized modification. (Cat II impact)
Discussion
If cron files and folders are accessible to unauthorized users, malicious jobs may be created.
Check Content
At the command line, execute the following command: # stat -c "%n permissions are %a and owned by %U:%G" /etc/cron.d /etc/cron.daily /etc/cron.hourly /etc/cron.monthly /etc/cron.weekly Expected result: /etc/cron.d permissions are 755 and owned by root:root /etc/cron.daily permissions are 755 and owned by root:root /etc/cron.hourly permissions are 755 and owned by root:root /etc/cron.monthly permissions are 755 and owned by root:root /etc/cron.weekly permissions are 755 and owned by root:root If the output does not match the expected result, this is a finding.
Fix Text
At the command line, execute the following commands for each returned file: # chmod 755 <path> # chown root:root <path>
Additional Identifiers
Rule ID: SV-239174r675330_rule
Vulnerability ID: V-239174
Group Title: SRG-OS-000480-GPOS-00227
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000366 |
The organization implements the security configuration settings. |
Controls
Number | Title |
---|---|
CM-6 |
Configuration Settings |