The Photon operating system must be configured so the "/etc/cron.allow" file is protected from unauthorized modification.
Overview
| Finding ID | Version | Rule ID | IA Controls | Severity |
| V-256564 | PHTN-30-000095 | SV-256564r991589_rule | CCI-000366 | medium |
| Description | ||||
| If cron files and folders are accessible to unauthorized users, malicious jobs may be created. | ||||
| STIG | Date | |||
| VMware vSphere 7.0 vCenter Appliance Photon OS Security Technical Implementation Guide | 2024-12-16 | |||
Details
Check Text (C-256564r991589_chk)
At the command line, run the following command:
# stat -c "%n permissions are %a and owned by %U:%G" /etc/cron.allow
Expected result:
/etc/cron.allow permissions are 600 and owned by root:root
If the output does not match the expected result, this is a finding.
Fix Text (F-60182r887365_fix)
At the command line, run the following commands:
# chmod 600 /etc/cron.allow
# chown root:root /etc/cron.allow