GEN003260 - The cron.deny file must be owned by root, bin, or sys.

Information

Cron daemon control files restrict the scheduling of automated tasks and must be protected.

Solution

# chown root /etc/cron.deny

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Oracle_Linux_5_V2R1_STIG.zip

Item Details

Category: ACCESS CONTROL, CONFIGURATION MANAGEMENT

References: 800-53|AC-6, 800-53|CM-5(6), CAT|II, CCI|CCI-000225, CCI|CCI-001499, Rule-ID|SV-218454r603259_rule, STIG-ID|GEN003260, STIG-Legacy|SV-64361, STIG-Legacy|V-4430, Vuln-ID|V-218454

Plugin: Unix

Control ID: 9e4764d51a7e4b72811d460d07273ea27e1348b9e57e6e8ecd4d12aa2c1ff3b8