Name | Audit Name | Plugin | Category |
---|---|---|---|
5.1.8 Ensure cron is restricted to authorized users | CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG | Unix | CONFIGURATION MANAGEMENT |
5.1.8 Ensure cron is restricted to authorized users - /etc/cron.allow | CIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 Workstation | Unix | ACCESS CONTROL, MEDIA PROTECTION |
5.1.8 Ensure cron is restricted to authorized users - /etc/cron.allow | CIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 Server | Unix | ACCESS CONTROL, MEDIA PROTECTION |
5.1.8 Ensure cron is restricted to authorized users - /etc/cron.deny | CIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 Workstation | Unix | ACCESS CONTROL, MEDIA PROTECTION |
5.1.8 Ensure cron is restricted to authorized users - /etc/cron.deny | CIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 Server | Unix | ACCESS CONTROL, MEDIA PROTECTION |