STIGQter STIGQter: STIG Summary: Red Hat Enterprise Linux 6 Security Technical Implementation Guide Version: 1 Release: 24 Benchmark Date: 25 Oct 2019: The cron service must be running.

DISA Rule

SV-50406r2_rule

Vulnerability Number

V-38605

Group Title

SRG-OS-999999

Rule Version

RHEL-06-000224

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

The "crond" service is used to execute commands at preconfigured times. It is required by almost all systems to perform necessary maintenance tasks, such as notifying root of system activity. The "crond" service can be enabled with the following commands:

# chkconfig crond on
# service crond start

Check Contents

Run the following command to determine the current status of the "crond" service:

# service crond status

If the service is enabled, it should return the following:

crond is running...


If the service is not running, this is a finding.

Vulnerability Number

V-38605

Documentable

False

Rule Version

RHEL-06-000224

Severity Override Guidance

Run the following command to determine the current status of the "crond" service:

# service crond status

If the service is enabled, it should return the following:

crond is running...


If the service is not running, this is a finding.

Check Content Reference

M

Target Key

2367

Comments