STIGQter STIGQter: STIG Summary: VMware vSphere 6.7 Photon OS Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 09 Mar 2021:

The Photon operating system must be configured so that all cron paths are protected from unauthorized modification.

DISA Rule

SV-239174r675330_rule

Vulnerability Number

V-239174

Group Title

SRG-OS-000480-GPOS-00227

Rule Version

PHTN-67-000103

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

At the command line, execute the following commands for each returned file:

# chmod 755 <path>
# chown root:root <path>

Check Contents

At the command line, execute the following command:

# stat -c "%n permissions are %a and owned by %U:%G" /etc/cron.d /etc/cron.daily /etc/cron.hourly /etc/cron.monthly /etc/cron.weekly

Expected result:

/etc/cron.d permissions are 755 and owned by root:root
/etc/cron.daily permissions are 755 and owned by root:root
/etc/cron.hourly permissions are 755 and owned by root:root
/etc/cron.monthly permissions are 755 and owned by root:root
/etc/cron.weekly permissions are 755 and owned by root:root

If the output does not match the expected result, this is a finding.

Vulnerability Number

V-239174

Documentable

False

Rule Version

PHTN-67-000103

Severity Override Guidance

At the command line, execute the following command:

# stat -c "%n permissions are %a and owned by %U:%G" /etc/cron.d /etc/cron.daily /etc/cron.hourly /etc/cron.monthly /etc/cron.weekly

Expected result:

/etc/cron.d permissions are 755 and owned by root:root
/etc/cron.daily permissions are 755 and owned by root:root
/etc/cron.hourly permissions are 755 and owned by root:root
/etc/cron.monthly permissions are 755 and owned by root:root
/etc/cron.weekly permissions are 755 and owned by root:root

If the output does not match the expected result, this is a finding.

Check Content Reference

M

Target Key

5323

Comments