Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-22315 | GEN001270 | SV-37233r1_rule | ECLP-1 ECTP-1 | Medium |
Description |
---|
If the system log files are not protected, unauthorized users could change the logged data, eliminating its forensic value. Authorized software may be given log file access through the use of extended ACLs when needed and configured to provide the least privileges required. |
STIG | Date |
---|---|
Red Hat Enterprise Linux 5 Security Technical Implementation Guide | 2017-01-27 |
Check Text ( None ) |
---|
None |
Fix Text (F-31180r1_fix) |
---|
Remove the extended ACL from the file. Procedure: # setfacl --remove-all [file with extended ACL] |