UCF STIG Viewer Logo

All system audit files must not have extended ACLs.


Overview

Finding ID Version Rule ID IA Controls Severity
V-22369 GEN002710 SV-38355r1_rule ECTP-1 Medium
Description
If a user can write to the audit logs, then audit trails can be modified or destroyed and system intrusion may not be detected.
STIG Date
HP-UX 11.31 Security Technical Implementation Guide 2013-06-27

Details

Check Text ( C-36436r2_chk )
Check the system audit log files for extended ACLs.
Determine the location of the log files.
# cat /.secure/etc/audnames /etc/audit/audnames

For each audit file, check for extended ACLs.
# ls -lLd
# ls -lLa


If the permissions include a "+" the file has an extended ACL, this is a finding.
Fix Text (F-31775r1_fix)
Remove the optional ACL from the file.
# chacl -z [audit file]