6.2.1 Ensure at is restricted to authorized users

Information

This change creates an at.allow file with a root user entry and removes the at.deny file, if it exists.

This ensures that only the root user has the ability to schedule jobs through the at command. A hacker may exploit use of at to execute programs or processes automatically. Limiting access to the root account only reduces this risk.

Solution

Create the /var/adm/cron/at.allow file and remove /var/adm/cron/at.deny (if it exists):

echo "root" > /var/adm/cron/at.allow
rm /var/adm/cron/at.deny

See Also

https://workbench.cisecurity.org/benchmarks/10385

Item Details

Category: SYSTEM AND INFORMATION INTEGRITY

References: 800-53|SI-16

Plugin: Unix

Control ID: cbc77816b7858cd9d5f0a19c12ef9f081117f9af1fd4d48e16686e6a885e0884