GEN002960 - Access to the cron utility must be controlled using the cron.allow and/or cron.deny file(s) - 'cron.allow exists'

Information

The cron facility allows users to execute recurring jobs on a regular and unattended basis. The cron.allow file designates accounts allowed to enter and execute jobs using the cron facility. If the cron.allow file is not present, users listed in the cron.deny file are not allowed to use the cron facility. Improper configuration of cron may open the facility up for abuse by system intruders and malicious users.

Solution

Create /etc/cron.allow and/or /etc/cron.deny with appropriate content and reboot the system to ensure no lingering cron jobs are processed.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Oracle_Linux_5_V2R1_STIG.zip

Item Details

Category: ACCESS CONTROL, CONFIGURATION MANAGEMENT

References: 800-53|AC-6, 800-53|CM-5(6), CAT|II, CCI|CCI-000225, CCI|CCI-001499, Rule-ID|SV-218428r603259_rule, STIG-ID|GEN002960, STIG-Legacy|SV-64415, STIG-Legacy|V-974, Vuln-ID|V-218428

Plugin: Unix

Control ID: d532b54fb7ea2b705f42b0a221e3df238c8a4e6a2d800f94c7891ba0fa3512bd