UCF STIG Viewer Logo

Audit log files must be owned by root.


Overview

Finding ID Version Rule ID IA Controls Severity
RHEL-06-000384A RHEL-06-000384A RHEL-06-000384A_rule Medium
Description
If non-privileged users can write to audit logs, audit trails can be modified or destroyed.
STIG Date
Red Hat Enterprise Linux 6 Security Technical Implementation Guide 2013-02-05

Details

Check Text ( C-RHEL-06-000384A_chk )
Run the following command to check the owner of the system audit logs:

grep "^log_file" /etc/audit/auditd.conf|sed s/^[^\/]*//|xargs stat -c %U:%n

Audit logs must be owned by root.
If they are not, this is a finding.
Fix Text (F-RHEL-06-000384A_fix)
Change the owner of the audit log files with the following command:

# chown root [audit_file]