GEN003060 - Default system accounts (with the exception of root) must not be listed in the cron.allow file or must be included in the cron.deny file, if cron.allow does not exist - 'adm'

Information

To centralize the management of privileged account crontabs, of the default system accounts, only root may have a crontab.

Solution

Remove default system accounts (such as bin, sys, adm, or others, traditionally UID less than 500) from the cron.allow file if it exists, or add those accounts to the cron.deny file.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Oracle_Linux_5_V2R1_STIG.zip

Item Details

Category: ACCESS CONTROL, CONFIGURATION MANAGEMENT

References: 800-53|AC-6, 800-53|CM-5(6), CAT|II, CCI|CCI-000225, CCI|CCI-001499, Rule-ID|SV-218435r603259_rule, STIG-ID|GEN003060, STIG-Legacy|SV-64395, STIG-Legacy|V-11995, Vuln-ID|V-218435

Plugin: Unix

Control ID: 2cb15f829f35ecfefcb83a51140df6fc4b930d0b57ecf8ba02c55af1c8ebb7e5