UCF STIG Viewer Logo

The Photon operating system must be configured so that all cron jobs are protected from unauthorized modification.


Overview

Finding ID Version Rule ID IA Controls Severity
V-239173 PHTN-67-000102 SV-239173r675327_rule Medium
Description
If cron files and folders are accessible to unauthorized users, malicious jobs may be created.
STIG Date
VMware vSphere 6.7 Photon OS Security Technical Implementation Guide 2022-01-03

Details

Check Text ( C-42384r675325_chk )
At the command line, execute the following command:

# find /etc/cron.d/ /etc/cron.daily/ /etc/cron.hourly/ /etc/cron.monthly/ /etc/cron.weekly/ -xdev -type f -a '(' -perm -002 -o -not -user root -o -not -group root ')' -exec ls -ld {} \;

If any files are returned, this is a finding.
Fix Text (F-42343r675326_fix)
At the command line, execute the following commands for each returned file:

# chmod o-w
# chown root:root