STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to SUSE Linux Enterprise Server v11 for System z Security Technical Implementation Guide

V-981

CAT II (Medium)

Cron and crontab directories must be group-owned by root, sys, bin or cron.

Rule ID

SV-45609r1_rule

STIG

SUSE Linux Enterprise Server v11 for System z Security Technical Implementation Guide

Version

V1R12

CCIs

CCI-000225

Discussion

To protect the integrity of scheduled system jobs and to prevent malicious modification to these jobs, crontab files must be secured. Failure to give group-ownership of cron or crontab directories to a system group provides the designated group and unauthorized users with the potential to access sensitive information or change the system configuration which could weaken the system's security posture.

Check Content

Check the group owner of cron and crontab directories.

Procedure:
# ls -ld /var/spool/cron /var/spool/cron/tabs


ls -ld /etc/crontab /etc/cron.{d,daily,hourly,monthly,weekly}
or 
# ls -ld /etc/cron*|grep -v deny


If a directory is not group-owned by root, sys, bin, or cron, this is a finding.

Fix Text

Change the group owner of cron and crontab directories.
# chgrp root <crontab directory>