UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Audit log files must be group-owned by root.


Overview

Finding ID Version Rule ID IA Controls Severity
V-38445 RHEL-06-000522 SV-50245r2_rule Medium
Description
If non-privileged users can write to audit logs, audit trails can be modified or destroyed.
STIG Date
Red Hat Enterprise Linux 6 Security Technical Implementation Guide 2016-12-16

Details

Check Text ( C-46000r1_chk )
Run the following command to check the group owner of the system audit logs:

grep "^log_file" /etc/audit/auditd.conf|sed s/^[^\/]*//|xargs stat -c %G:%n

Audit logs must be group-owned by root.
If they are not, this is a finding.
Fix Text (F-43390r1_fix)
Change the group owner of the audit log files with the following command:

# chgrp root [audit_file]