STIGQter STIGQter: STIG Summary: IBM AIX 7.x Security Technical Implementation Guide Version: 2 Release: 2 Benchmark Date: 23 Apr 2021:

AIX default system accounts (with the exception of root) must not be listed in the cron.allow file or must be included in the cron.deny file, if cron.allow does not exist.

DISA Rule

SV-215192r508663_rule

Vulnerability Number

V-215192

Group Title

SRG-OS-000480-GPOS-00227

Rule Version

AIX7-00-001033

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Remove default system accounts (such as bin, sys, adm, or lpd) from the "cron.allow" file, or add those accounts to the "cron.deny" file.

Check Contents

Check the "cron.allow" and "cron.deny" files for the system using commands:
# more /var/adm/cron/cron.allow
# more /var/adm/cron/cron.deny

If the "cron.allow" file exists and is empty, this is a finding.

If a default system account (such as bin, sys, adm, or lpd) is listed in the "cron.allow" file, or not listed in the "cron.deny" file, this is a finding.

Vulnerability Number

V-215192

Documentable

False

Rule Version

AIX7-00-001033

Severity Override Guidance

Check the "cron.allow" and "cron.deny" files for the system using commands:
# more /var/adm/cron/cron.allow
# more /var/adm/cron/cron.deny

If the "cron.allow" file exists and is empty, this is a finding.

If a default system account (such as bin, sys, adm, or lpd) is listed in the "cron.allow" file, or not listed in the "cron.deny" file, this is a finding.

Check Content Reference

M

Target Key

4012

Comments