Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-218085 | RHEL-06-000384 | SV-218085r505923_rule | Medium |
Description |
---|
If non-privileged users can write to audit logs, audit trails can be modified or destroyed. |
STIG | Date |
---|---|
Red Hat Enterprise Linux 6 Security Technical Implementation Guide | 2020-09-03 |
Check Text ( C-19566r377270_chk ) |
---|
Run the following command to check the owner of the system audit logs: grep "^log_file" /etc/audit/auditd.conf|sed s/^[^\/]*//|xargs stat -c %U:%n Audit logs must be owned by root. If they are not, this is a finding. |
Fix Text (F-19564r377271_fix) |
---|
Change the owner of the audit log files with the following command: # chown root [audit_file] |