STIGQter STIGQter: STIG Summary: Solaris 10 X86 Security Technical Implementation Guide Version: 2 Release: 2 Benchmark Date: 22 Jan 2021:

Default system accounts (with the exception of root) must not be listed in the at.allow file or must be included in the at.deny file if the at.allow file does not exist.

DISA Rule

SV-227767r603266_rule

Vulnerability Number

V-227767

Group Title

SRG-OS-000480

Rule Version

GEN003320

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Remove the default accounts (such as bin, sys, adm, and others) from the at.allow file.

Check Contents

# more /etc/cron.d/at.allow
If default accounts (such as bin, sys, adm, and others) are listed in the at.allow file, this is a finding.

Vulnerability Number

V-227767

Documentable

False

Rule Version

GEN003320

Severity Override Guidance

# more /etc/cron.d/at.allow
If default accounts (such as bin, sys, adm, and others) are listed in the at.allow file, this is a finding.

Check Content Reference

M

Target Key

4061

Comments