[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248364

 
 

909

 
 

195388

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

Ensure audit backlog limit is configured appropriately

ID: oval:org.secpod.oval:def:72658Date: (C)2021-05-28   (M)2024-04-23
Class: COMPLIANCEFamily: unix




Configure /etc/cron.allow and /etc/at.allow to allow specific users to use these services. If /etc/cron.allow or /etc/at.allow do not exist, then /etc/at.deny and /etc/cron.deny are checked. Any user not specifically defined in those files is allowed to use at and cron. By removing the files, only users in /etc/cron.allow and /etc/at.allow are allowed to use at and cron. Note that even though a given user is not listed in cron.allow, cron jobs can still be run as that user. The cron.allow file only controls administrative access to the crontab command for scheduling and modifying cron jobs.

Platform:
Red Hat Enterprise Linux 7
Reference:
CCE-95421-4
CPE    1
cpe:/o:redhat:enterprise_linux:7
CCE    1
CCE-95421-4
XCCDF    1
xccdf_org.secpod_benchmark_general_RHEL_7

© SecPod Technologies