Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-787 | GEN001260 | SV-37228r2_rule | ECTP-1 | Medium |
Description |
---|
If the system log files are not protected, unauthorized users could change the logged data, eliminating its forensic value. |
STIG | Date |
---|---|
Red Hat Enterprise Linux 5 Security Technical Implementation Guide | 2015-03-12 |
Check Text ( C-35918r3_chk ) |
---|
Check the mode of log files. Procedure: # find /var/log /var/log/syslog /var/adm -type f -perm -640 \! -perm 640 With the exception of /var/log/wtmp, if any of the log files have modes more permissive than 0640, this is a finding. |
Fix Text (F-31175r1_fix) |
---|
Change the mode of the system log file(s) to 0640 or less permissive. Procedure: # chmod 0640 /path/to/system-log-file Note: Do not confuse system log files with audit logs. |