UCF STIG Viewer Logo

System log files must have mode 0640 or less permissive.


Overview

Finding ID Version Rule ID IA Controls Severity
V-787 GEN001260 SV-37228r1_rule ECTP-1 Medium
Description
If the system log files are not protected, unauthorized users could change the logged data, eliminating its forensic value.
STIG Date
Red Hat Enterprise Linux 5 Security Technical Implementation Guide 2014-07-02

Details

Check Text ( None )
None
Fix Text (F-31175r1_fix)
Change the mode of the system log file(s) to 0640 or less permissive.

Procedure:
# chmod 0640 /path/to/system-log-file

Note: Do not confuse system log files with audit logs.