The Photon operating system must be configured so that all cron jobs are protected from unauthorized modification.
Overview
| Finding ID | Version | Rule ID | IA Controls | Severity |
| V-256565 | PHTN-30-000096 | SV-256565r991589_rule | CCI-000366 | medium |
| Description | ||||
| If cron files and folders are accessible to unauthorized users, malicious jobs may be created. | ||||
| STIG | Date | |||
| VMware vSphere 7.0 vCenter Appliance Photon OS Security Technical Implementation Guide | 2024-12-16 | |||
Details
Check Text (C-256565r991589_chk)
At the command line, run the following command:
# find /etc/cron.d/ /etc/cron.daily/ /etc/cron.hourly/ /etc/cron.monthly/ /etc/cron.weekly/ -xdev -type f -a '(' -perm -022 -o -not -user root ')' -exec ls -ld {} \;
If any files are returned, this is a finding.
Fix Text (F-60183r887368_fix)
At the command line, run the following commands for each returned file:
# chmod 644 <file>
# chown root <file>