GEN003060 - System accounts must not be listed in cron.allow or must be included in cron.deny - 'nobody' - cron.allow

Information

To centralize the management of privileged account crontabs, of the default system accounts, only root may have a crontab.

Solution

Remove default system accounts (such as bin, sys, adm, or others, traditionally UID less than 500) from the cron.allow file if it exists, or add those accounts to the cron.deny file.

See Also

http://iasecontent.disa.mil/stigs/zip/U_RedHat_5_V1R18_STIG.zip

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-6, CAT|II, CCI|CCI-000225, Group-ID|V-11995, Rule-ID|SV-27338r1_rule, STIG-ID|GEN003060, Vuln-ID|V-11995

Plugin: Unix

Control ID: c855da908cb5ea14a789964e9a8bc93463668c18e0510260080d934e00cf0a91