Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-209054 | OL6-00-000384 | SV-209054r505921_rule | Medium |
Description |
---|
If non-privileged users can write to audit logs, audit trails can be modified or destroyed. |
STIG | Date |
---|---|
Oracle Linux 6 Security Technical Implementation Guide | 2020-09-10 |
Check Text ( C-9307r357947_chk ) |
---|
Run the following command to check the owner of the system audit logs: grep "^log_file" /etc/audit/auditd.conf|sed s/^[^\/]*//|xargs stat -c %U:%n Audit logs must be owned by root. If they are not, this is a finding. |
Fix Text (F-9307r357948_fix) |
---|
Change the owner of the audit log files with the following command: # chown root [audit_file] |