STIGQter STIGQter: STIG Summary: VMware vSphere 6.7 Photon OS Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 09 Mar 2021:

The Photon operating system must be configured so that the /etc/cron.allow file is protected from unauthorized modification.

DISA Rule

SV-239172r675324_rule

Vulnerability Number

V-239172

Group Title

SRG-OS-000480-GPOS-00227

Rule Version

PHTN-67-000101

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

At the command line, execute the following commands:

# chmod 600 /etc/cron.allow
# chown root:root /etc/cron.allow

Check Contents

At the command line, execute the following command:

# stat -c "%n permissions are %a and owned by %U:%G" /etc/cron.allow

Expected result:

/etc/cron.allow permissions are 600 and owned by root:root

If the output does not match the expected result, this is a finding.

Vulnerability Number

V-239172

Documentable

False

Rule Version

PHTN-67-000101

Severity Override Guidance

At the command line, execute the following command:

# stat -c "%n permissions are %a and owned by %U:%G" /etc/cron.allow

Expected result:

/etc/cron.allow permissions are 600 and owned by root:root

If the output does not match the expected result, this is a finding.

Check Content Reference

M

Target Key

5323

Comments