The Photon operating system must be configured so that all cron jobs are protected from unauthorized modification.
Overview
Finding ID |
Version |
Rule ID |
IA Controls |
Severity |
V-256565 |
PHTN-30-000096 |
SV-256565r991589_rule |
|
Medium |
Description |
If cron files and folders are accessible to unauthorized users, malicious jobs may be created. |
Details
Check Text (C-60240r887367_chk) |
At the command line, run the following command:
# find /etc/cron.d/ /etc/cron.daily/ /etc/cron.hourly/ /etc/cron.monthly/ /etc/cron.weekly/ -xdev -type f -a '(' -perm -022 -o -not -user root ')' -exec ls -ld {} \;
If any files are returned, this is a finding. |
Fix Text (F-60183r887368_fix) |
At the command line, run the following commands for each returned file:
# chmod 644 <file>
# chown root <file> |