Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-38445 | RHEL-06-000522 | SV-50245r2_rule | Medium |
Description |
---|
If non-privileged users can write to audit logs, audit trails can be modified or destroyed. |
STIG | Date |
---|---|
Red Hat Enterprise Linux 6 Security Technical Implementation Guide | 2017-05-19 |
Check Text ( C-46000r1_chk ) |
---|
Run the following command to check the group owner of the system audit logs: grep "^log_file" /etc/audit/auditd.conf|sed s/^[^\/]*//|xargs stat -c %G:%n Audit logs must be group-owned by root. If they are not, this is a finding. |
Fix Text (F-43390r1_fix) |
---|
Change the group owner of the audit log files with the following command: # chgrp root [audit_file] |