GEN003320 - System accounts must not be listed in at.allow or must be included in at.deny - 'invscout' - at.allow

Information

Default accounts, such as bin, sys, adm, uucp, daemon, and others, should never have access to the at facility. This would create a possible vulnerability open to intruders or malicious users.

Solution

Remove the default accounts (such as bin, sys, adm, and others) from the at.allow file.

See Also

http://iasecontent.disa.mil/stigs/zip/U_STIG_Library_2015_07.zip