File: rule.yml

package info (click to toggle)
scap-security-guide 0.1.78-1
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid
  • size: 114,600 kB
  • sloc: xml: 245,305; sh: 84,381; python: 33,093; makefile: 27
file content (48 lines) | stat: -rw-r--r-- 1,543 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
documentation_complete: true


title: 'Verify Owner on crontab'

description: |-
    {{{ describe_file_owner(file="/etc/crontab", owner="root") }}}

rationale: |-
    Service configuration files enable or disable features of their respective services that if configured incorrectly
    can lead to insecure and vulnerable configurations. Therefore, service configuration files should be owned by the
    correct user to prevent unauthorized changes.

severity: medium

identifiers:
    cce@rhel8: CCE-82224-7
    cce@rhel9: CCE-84167-6
    cce@rhel10: CCE-87294-5
    cce@sle12: CCE-92265-8
    cce@sle15: CCE-91381-4

references:
    cis-csc: 12,13,14,15,16,18,3,5
    cis@sle12: 5.1.2
    cis@sle15: 5.1.2
    cobit5: APO01.06,DSS05.04,DSS05.07,DSS06.02
    isa-62443-2009: 4.3.3.7.3
    isa-62443-2013: 'SR 2.1,SR 5.2'
    iso27001-2013: A.10.1.1,A.11.1.4,A.11.1.5,A.11.2.1,A.13.1.1,A.13.1.3,A.13.2.1,A.13.2.3,A.13.2.4,A.14.1.2,A.14.1.3,A.6.1.2,A.7.1.1,A.7.1.2,A.7.3.1,A.8.2.2,A.8.2.3,A.9.1.1,A.9.1.2,A.9.2.3,A.9.4.1,A.9.4.4,A.9.4.5
    nist: CM-6(a),AC-6(1)
    nist-csf: PR.AC-4,PR.DS-5
    srg: SRG-OS-000480-GPOS-00227

ocil_clause: '{{{ ocil_clause_file_owner(file="/etc/crontab", owner="root") }}}'

ocil: |-
    {{{ ocil_file_owner(file="/etc/crontab", owner="root") }}}

fixtext: '{{{ fixtext_file_owner(file="/etc/crontab", owner="root") }}}'

srg_requirement: '{{{ srg_requirement_file_owner(file="/etc/crontab", owner="root") }}}'

template:
    name: file_owner
    vars:
        filepath: /etc/crontab
        uid_or_name: '0'