GEN003480 - The at.deny file must be owned by root, bin, or sys.

Information

If the owner of the at.deny file is not set to root, bin, or sys, unauthorized users could be allowed to view or edit sensitive information contained within the file.

Solution

Change the owner of the at.deny file.
# chown root /etc/cron.d/at.deny

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_SOL_10_SPARC_V2R4_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|II, CCI|CCI-000366, Rule-ID|SV-226873r603265_rule, STIG-ID|GEN003480, STIG-Legacy|SV-27396, STIG-Legacy|V-4368, Vuln-ID|V-226873

Plugin: Unix

Control ID: 8b1f5e8372f85f9c94459ed0bed571cf95618cf4e3caec471fb59fca3e1613e3