Rule ID
SV-45628r1_rule
Version
V1R12
CCIs
If there are excessive file permissions for the cron.deny file, sensitive information could be viewed or edited by unauthorized users.
Check the permissions of the file. # ls -lL /etc/cron.deny If the permissions include a '+', the file has an extended ACL. If the file has an extended ACL and it has not been documented with the IAO, this is a finding.
Remove the extended ACL from the file. # setfacl --remove-all /etc/cron.deny