STIG ID: OL07-00-021110 | SRG: SRG-OS-000480-GPOS-00227 | Severity: medium | CCI: | Vulnerability Id: V-221751
If the owner of the "cron.allow" file is not set to root, the possibility exists for an unauthorized user to view or to edit sensitive information.
Set the owner on the "/etc/cron.allow" file to root with the following command:
# chown root /etc/cron.allow
Verify that the "cron.allow" file is owned by root.
Check the owner of the "cron.allow" file with the following command:
# ls -al /etc/cron.allow
-rw------- 1 root root 6 Mar 5 2011 /etc/cron.allow
If the "cron.allow" file exists and has an owner other than root, this is a finding.