GEN003160 - Cron logging must be implemented.

Information

Cron logging can be used to trace the successful or unsuccessful execution of cron jobs. It can also be used to spot intrusions into the use of the cron facility by unauthorized and malicious users.

Solution

Edit /etc/syslog.conf or /etc/rsyslog.conf and setup cron logging.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Oracle_Linux_5_V2R1_STIG.zip

Item Details

Category: AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

References: 800-53|AU-2d., 800-53|CM-6b., CAT|II, CCI|CCI-000126, CCI|CCI-000366, Rule-ID|SV-218443r603259_rule, STIG-ID|GEN003160, STIG-Legacy|SV-64313, STIG-Legacy|V-982, Vuln-ID|V-218443

Plugin: Unix

Control ID: 296c4d6be071f99ebef80e5d6f6e540f1eb5200afe0e5320248cf14adba652e8