File: rule.yml

package info (click to toggle)
scap-security-guide 0.1.78-1
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid
  • size: 114,600 kB
  • sloc: xml: 245,305; sh: 84,381; python: 33,093; makefile: 27
file content (48 lines) | stat: -rw-r--r-- 1,605 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
documentation_complete: true


title: 'Verify Permissions on crontab'

description: |-
    {{{ describe_file_permissions(file="/etc/crontab", perms="0600") }}}

rationale: |-
    Service configuration files enable or disable features of their respective services that if configured incorrectly
    can lead to insecure and vulnerable configurations. Therefore, service configuration files should have the
    correct access rights to prevent unauthorized changes.

severity: medium

identifiers:
    cce@rhel8: CCE-82206-4
    cce@rhel9: CCE-84176-7
    cce@rhel10: CCE-90078-7
    cce@sle12: CCE-91667-6
    cce@sle15: CCE-91299-8

references:
    cis-csc: 12,13,14,15,16,18,3,5
    cis@sle12: 5.1.2
    cis@sle15: 5.1.2
    cobit5: APO01.06,DSS05.04,DSS05.07,DSS06.02
    isa-62443-2009: 4.3.3.7.3
    isa-62443-2013: 'SR 2.1,SR 5.2'
    iso27001-2013: A.10.1.1,A.11.1.4,A.11.1.5,A.11.2.1,A.13.1.1,A.13.1.3,A.13.2.1,A.13.2.3,A.13.2.4,A.14.1.2,A.14.1.3,A.6.1.2,A.7.1.1,A.7.1.2,A.7.3.1,A.8.2.2,A.8.2.3,A.9.1.1,A.9.1.2,A.9.2.3,A.9.4.1,A.9.4.4,A.9.4.5
    nist: CM-6(a),AC-6(1)
    nist-csf: PR.AC-4,PR.DS-5
    srg: SRG-OS-000480-GPOS-00227

ocil_clause: '{{{ ocil_clause_file_permissions(file="/etc/crontab", perms="-rw-------") }}}'

ocil: |-
    {{{ ocil_file_permissions(file="/etc/crontab", perms="-rw-------") }}}

fixtext: '{{{ fixtext_file_permissions(file="/etc/cron.weekly/", mode="0600") }}}'

srg_requirement: '{{{ srg_requirement_file_permission(file="/etc/cron.weekly", mode="0600") }}}'

template:
    name: file_permissions
    vars:
        filepath: /etc/crontab
        filemode: '0600'