UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Audit log files must be group-owned by root.


Overview

Finding ID Version Rule ID IA Controls Severity
V-209066 OL6-00-000522 SV-209066r603263_rule Medium
Description
If non-privileged users can write to audit logs, audit trails can be modified or destroyed.
STIG Date
Oracle Linux 6 Security Technical Implementation Guide 2020-12-04

Details

Check Text ( C-9319r357983_chk )
Run the following command to check the group owner of the system audit logs:

grep "^log_file" /etc/audit/auditd.conf|sed s/^[^\/]*//|xargs stat -c %G:%n

Audit logs must be group-owned by root.
If they are not, this is a finding.
Fix Text (F-9319r357984_fix)
Change the group owner of the audit log files with the following command:

# chgrp root [audit_file]