STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 1 hour ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to IBM AIX 7.x Security Technical Implementation Guide

V-245566

CAT II (Medium)

The AIX /var/spool/cron/atjobs directory must be owned by root or bin.

Rule ID

SV-245566r991589_rule

STIG

IBM AIX 7.x Security Technical Implementation Guide

Version

V3R2

CCIs

CCI-000366

Discussion

Unauthorized ownership of the /var/spool/cron/atjobs directory could permit unauthorized users the ability to alter atjobs and run automated jobs as privileged users. Failure to set proper permissions of the /var/spool/cron/atjobs directory provides unauthorized users with the potential to access sensitive information or change the system configuration which could weaken the system's security posture.

Check Content

Check the ownership of the /var/spool/cron/atjobs directory using command:
# ls -ld /var/spool/cron/atjobs

The above command should yield the following output:
drw-r----- 1 bin cron 993 Mar 11 07:04 /var/spool/cron/atjobs

If the owner of the "atjobs" directory is not "root" or "bin", this is a finding.

Fix Text

Change the ownership of the "atjobs" directory to bin using command: 
# chown bin /var/spool/cron/atjobs