UCF STIG Viewer Logo

Audit log files must be owned by root.


Overview

Finding ID Version Rule ID IA Controls Severity
V-50629 OL6-00-000384 SV-64835r1_rule Medium
Description
If non-privileged users can write to audit logs, audit trails can be modified or destroyed.
STIG Date
Oracle Linux 6 Security Technical Implementation Guide 2019-03-20

Details

Check Text ( C-53137r1_chk )
Run the following command to check the owner of the system audit logs:

grep "^log_file" /etc/audit/auditd.conf|sed s/^[^\/]*//|xargs stat -c %U:%n

Audit logs must be owned by root.
If they are not, this is a finding.
Fix Text (F-55427r1_fix)
Change the owner of the audit log files with the following command:

# chown root [audit_file]