UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

AIX audit tools must be owned by root.


Overview

Finding ID Version Rule ID IA Controls Severity
V-215248 AIX7-00-002025 SV-215248r508663_rule Medium
Description
Protecting audit information also includes identifying and protecting the tools used to view and manipulate log data. Therefore, protecting audit tools is necessary to prevent unauthorized operation on audit information. Operating systems providing tools to interface with audit information will leverage user permissions and roles identifying the user accessing the tools and the corresponding rights the user enjoys in order to make access decisions regarding the access to audit tools. Audit tools include, but are not limited to, vendor-provided and open source audit tools needed to successfully view and manipulate audit information system activity and records. Audit tools include custom queries and report generators. Satisfies: SRG-OS-000256-GPOS-00097, SRG-OS-000257-GPOS-00098, SRG-OS-000258-GPOS-00099
STIG Date
IBM AIX 7.x Security Technical Implementation Guide 2022-06-06

Details

Check Text ( C-16446r294195_chk )
Check the following audit tools are owned by "root":

/usr/sbin/audit
/usr/sbin/auditbin
/usr/sbin/auditcat
/usr/sbin/auditconv
/usr/sbin/auditmerge
/usr/sbin/auditpr
/usr/sbin/auditselect
/usr/sbin/auditstream
/usr/sbin/auditldap

# ls -l /usr/sbin/audit*|grep -v ldap
-r-sr-x--- 1 root audit 64926 Mar 30 2016 /usr/sbin/audit
-r-sr-x--- 1 root audit 41240 Mar 30 2016 /usr/sbin/auditbin
-r-sr-x--- 1 root audit 40700 Mar 30 2016 /usr/sbin/auditcat
-r-sr-x--- 1 root audit 13072 Mar 30 2016 /usr/sbin/auditconv
-r-sr-x--- 1 root audit 11328 Mar 30 2016 /usr/sbin/auditmerge
-r-sr-x--- 1 root audit 53466 Mar 30 2016 /usr/sbin/auditpr
-r-sr-x--- 1 root audit 33128 Mar 30 2016 /usr/sbin/auditselect
-r-sr-x--- 1 root audit 29952 Mar 30 2016 /usr/sbin/auditstream
-r-x------ 1 root security 12204 Mar 30 2016 /usr/sbin/auditldap

If any above file's ownership is not "root", this is a finding.
Fix Text (F-16444r294196_fix)
For each audit tool in:
/usr/sbin/audit
/usr/sbin/auditbin
/usr/sbin/auditcat
/usr/sbin/auditconv
/usr/sbin/auditmerge
/usr/sbin/auditpr
/usr/sbin/auditselect
/usr/sbin/auditstream

Set the owner to "root".
# chown root

For /usr/sbin/auditldap

Set the owner to "root".
# chown root /usr/sbin/auditldap