UCF STIG Viewer Logo

System audit logs must be owned by root.


Overview

Finding ID Version Rule ID IA Controls Severity
V-812 GEN002680 SV-38477r1_rule ECTP-1 Medium
Description
Failure to give ownership of system audit log files to root provides the designated owner and unauthorized users with the potential to access sensitive information.
STIG Date
HP-UX 11.31 Security Technical Implementation Guide 2013-03-28

Details

Check Text ( C-36424r1_chk )
Determine the location of audit logs.
# cat /.secure/etc/audnames /etc/audit/audnames

For each audit log directory/file, check the ownership.
# ls -lLd
# ls -lLa

If any audit log directory/file is not owned by root, this is a finding.
Fix Text (F-31763r1_fix)
Change the ownership of the audit log directory/file.
# chown root