The Photon operating system must be configured so that all cron paths are protected from unauthorized modification.
Overview
| Finding ID | Version | Rule ID | IA Controls | Severity |
| V-256566 | PHTN-30-000097 | SV-256566r991589_rule | CCI-000366 | medium |
| Description | ||||
| If cron files and folders are accessible to unauthorized users, malicious jobs may be created. | ||||
| STIG | Date | |||
| VMware vSphere 7.0 vCenter Appliance Photon OS Security Technical Implementation Guide | 2024-12-16 | |||
Details
Check Text (C-256566r991589_chk)
At the command line, run the following command:
# stat -c "%n permissions are %a and owned by %U:%G" /etc/cron.d /etc/cron.daily /etc/cron.hourly /etc/cron.monthly /etc/cron.weekly
Expected result:
/etc/cron.d permissions are 755 and owned by root:root
/etc/cron.daily permissions are 755 and owned by root:root
/etc/cron.hourly permissions are 755 and owned by root:root
/etc/cron.monthly permissions are 755 and owned by root:root
/etc/cron.weekly permissions are 755 and owned by root:root
If the output does not match the expected result, this is a finding.
Fix Text (F-60184r887371_fix)
At the command line, run the following commands for each returned file:
# chmod 755 <path>
# chown root:root <path>