UCF STIG Viewer Logo

The audit log folder must have correct permissions.


Overview

Finding ID Version Rule ID IA Controls Severity
V-51653 OSX8-00-00205 SV-65863r1_rule Medium
Description
Non-repudiation of actions taken is required in order to maintain integrity. To do this, we will prevent users from modifying the audit logs. Non-repudiation protects individuals against later claims by an author of not having updated a particular file, invoked a specific command, or copied a specific file.
STIG Date
Apple OS X 10.8 (Mountain Lion) Workstation STIG 2015-02-10

Details

Check Text ( C-53961r2_chk )
To check the permissions of the audit log files, run the following command:

sudo -s stat -f "%A:%N" `sudo grep "^dir" /etc/security/audit_control | awk -F: '{print $2 "/*"}'` | grep -v current

The results should show the permissions (first column) to be "440" or less permissive. If not, this is a finding.
Fix Text (F-56451r1_fix)
For every log file that returns incorrect permissions, run the following command:

sudo chmod 440 [audit log file]

where [audit log file] is the full path of the log file that needs to be modified.