Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-51009 | OL6-00-000134 | SV-65215r2_rule | Medium |
Description |
---|
The log files generated by rsyslog contain valuable information regarding system configuration, user authentication, and other such information. Log files should be protected from unauthorized access. |
STIG | Date |
---|---|
Oracle Linux 6 Security Technical Implementation Guide | 2019-03-20 |
Check Text ( C-53451r2_chk ) |
---|
The group-owner of all log files written by "rsyslog" should be root. These log files are determined by the second part of each Rule line in "/etc/rsyslog.conf" and typically all appear in "/var/log". To see the group-owner of a given log file, run the following command: $ ls -l [LOGFILE] Some log files referenced in /etc/rsyslog.conf may be created by other programs and may require exclusion from consideration. If the group-owner is not root, this is a finding. |
Fix Text (F-55813r1_fix) |
---|
The group-owner of all log files written by "rsyslog" should be root. These log files are determined by the second part of each Rule line in "/etc/rsyslog.conf" and typically all appear in "/var/log". For each log file [LOGFILE] referenced in "/etc/rsyslog.conf", run the following command to inspect the file's group owner: $ ls -l [LOGFILE] If the owner is not "root", run the following command to correct this: # chgrp root [LOGFILE] |