UCF STIG Viewer Logo

The audit log folder must be owned by root:wheel.


Overview

Finding ID Version Rule ID IA Controls Severity
V-51657 OSX8-00-00210 SV-65867r1_rule Medium
Description
Non-repudiation of actions taken is required in order to maintain integrity. To do this, we will prevent users from modifying the audit logs. Non-repudiation protects individuals against later claims by an author of not having updated a particular file, invoked a specific command, or copied a specific file.
STIG Date
Apple OS X 10.8 (Mountain Lion) Workstation STIG 2015-02-10

Details

Check Text ( C-53965r1_chk )
To check the ownership of the audit log files, run the following command:

sudo -s ls -n `sudo grep "^dir" /etc/security/audit_control | awk -F: '{print $2 "/*"}'` | awk '{ print $3 ":" $4 ":" $9 }'

The results should read "0:0" in the first column. The first "0" is UID, the second is GID, with the first "0" being root, and the second "0" being wheel. If not, this is a finding.
Fix Text (F-56457r1_fix)
For every log file that is not owned by root, run the following command:

sudo chown root:wheel [audit log file]

where [audit log file] is the full path of the log file that needs to be modified.