File: rule.yml

package info (click to toggle)
scap-security-guide 0.1.78-1
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid
  • size: 114,600 kB
  • sloc: xml: 245,305; sh: 84,381; python: 33,093; makefile: 27
file content (48 lines) | stat: -rw-r--r-- 1,585 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
documentation_complete: true


title: 'Verify Group Who Owns Crontab'

description: |-
    {{{ describe_file_group_owner(file="/etc/crontab", group="root") }}}

rationale: |-
    Service configuration files enable or disable features of their respective services that if configured incorrectly
    can lead to insecure and vulnerable configurations. Therefore, service configuration files should be owned by the
    correct group to prevent unauthorized changes.

severity: medium

identifiers:
    cce@rhel8: CCE-82223-9
    cce@rhel9: CCE-84171-8
    cce@rhel10: CCE-89062-4
    cce@sle12: CCE-92264-1
    cce@sle15: CCE-91380-6

references:
    cis-csc: 12,13,14,15,16,18,3,5
    cis@sle12: 5.1.2
    cis@sle15: 5.1.2
    cobit5: APO01.06,DSS05.04,DSS05.07,DSS06.02
    isa-62443-2009: 4.3.3.7.3
    isa-62443-2013: 'SR 2.1,SR 5.2'
    iso27001-2013: A.10.1.1,A.11.1.4,A.11.1.5,A.11.2.1,A.13.1.1,A.13.1.3,A.13.2.1,A.13.2.3,A.13.2.4,A.14.1.2,A.14.1.3,A.6.1.2,A.7.1.1,A.7.1.2,A.7.3.1,A.8.2.2,A.8.2.3,A.9.1.1,A.9.1.2,A.9.2.3,A.9.4.1,A.9.4.4,A.9.4.5
    nist: CM-6(a),AC-6(1)
    nist-csf: PR.AC-4,PR.DS-5
    srg: SRG-OS-000480-GPOS-00227

ocil_clause: '{{{ ocil_clause_file_group_owner(file="/etc/crontab", group="root") }}}'

ocil: |-
    {{{ ocil_file_group_owner(file="/etc/crontab", group="root") }}}

fixtext: '{{{ fixtext_file_group_owner(file="/etc/crontab", group="root") }}}'

srg_requirement: '{{{ srg_requirement_file_group_owner(file="/etc/crontab", group="root") }}}'

template:
    name: file_groupowner
    vars:
        filepath: /etc/crontab
        gid_or_name: '0'