You are not logged in.
Hi! I've decided to reinstall my server to move back to an ext4 filesystem and I'm doing some minor housekeeping as I put everything back into place.
I've historically had a separate account to run all of my cron jobs, which has explicit root access to a few command lines via sudo. From a security standpoint, is simply disabling the account with /usr/sbin/nologin, and not including it in my SSH allowed users enough?
I've seen a couple places that've gone a bit further and locked the cron account as well, but I'd have to comment 'account required pam_access.so' in my /etc/pam.d/crond file. Would this have any negative security implications? Would locking this account be a good security practice?
Thanks!
Offline
Locking the password or change shell, does not disable an account, to do such thing, must set expire date
Offline