Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-50629 | OL6-00-000384 | SV-64835r1_rule | Medium |
Description |
---|
If non-privileged users can write to audit logs, audit trails can be modified or destroyed. |
STIG | Date |
---|---|
Oracle Linux 6 Security Technical Implementation Guide | 2014-06-12 |
Check Text ( C-53137r1_chk ) |
---|
Run the following command to check the owner of the system audit logs: grep "^log_file" /etc/audit/auditd.conf|sed s/^[^\/]*//|xargs stat -c %U:%n Audit logs must be owned by root. If they are not, this is a finding. |
Fix Text (F-55427r1_fix) |
---|
Change the owner of the audit log files with the following command: # chown root [audit_file] |