STIGQter STIGQter: STIG Summary: Solaris 10 X86 Security Technical Implementation Guide Version: 2 Release: 2 Benchmark Date: 22 Jan 2021:

Default system accounts (with the exception of root) must not be listed in the cron.allow file or must be included in the cron.deny file, if cron.allow does not exist.

DISA Rule

SV-227745r603266_rule

Vulnerability Number

V-227745

Group Title

SRG-OS-000480

Rule Version

GEN003060

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Remove default system accounts (such as bin, sys, adm, or others) from the cron.allow file if it exists, or add those accounts to the cron.deny file.

Check Contents

Check the cron.allow and cron.deny files for the system.
# more /etc/cron.d/cron.allow
# more /etc/cron.d/cron.deny
If a default system account (such as bin, sys, adm, or others) is listed in the cron.allow file, or not listed in the cron.deny file if no cron.allow file exists, this is a finding.

Vulnerability Number

V-227745

Documentable

False

Rule Version

GEN003060

Severity Override Guidance

Check the cron.allow and cron.deny files for the system.
# more /etc/cron.d/cron.allow
# more /etc/cron.d/cron.deny
If a default system account (such as bin, sys, adm, or others) is listed in the cron.allow file, or not listed in the cron.deny file if no cron.allow file exists, this is a finding.

Check Content Reference

M

Target Key

4061

Comments