STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to SUSE Linux Enterprise Server v11 for System z Security Technical Implementation Guide

V-975

CAT II (Medium)

The cron.allow file must have mode 0600 or less permissive.

Rule ID

SV-45573r1_rule

STIG

SUSE Linux Enterprise Server v11 for System z Security Technical Implementation Guide

Version

V1R12

CCIs

CCI-000225

Discussion

A readable and/or writable cron.allow file by users other than root could allow potential intruders and malicious users to use the file contents to help discern information, such as who is allowed to execute cron programs, which could be harmful to overall system and network security.

Check Content

Check mode of the cron.allow file.

Procedure:
# ls -lL /etc/cron.allow

If the file has a mode more permissive than 0600, this is a finding.

Fix Text

Change the mode of the cron.allow file to 0600.

Procedure:
# chmod 0600 /etc/cron.allow