UCF STIG Viewer Logo

All system audit files must not have extended ACLs.


Overview

Finding ID Version Rule ID IA Controls Severity
V-22369 GEN002710 SV-37917r1_rule ECTP-1 Medium
Description
If a user can write to the audit logs, then audit trails can be modified or destroyed and system intrusion may not be detected.
STIG Date
Red Hat Enterprise Linux 5 Security Technical Implementation Guide 2016-07-22

Details

Check Text ( None )
None
Fix Text (F-26222r1_fix)
Remove the extended ACL from the system audit file(s).