UCF STIG Viewer Logo

Audit log files must be owned by root.


Overview

Finding ID Version Rule ID IA Controls Severity
V-218085 RHEL-06-000384 SV-218085r505923_rule Medium
Description
If non-privileged users can write to audit logs, audit trails can be modified or destroyed.
STIG Date
Red Hat Enterprise Linux 6 Security Technical Implementation Guide 2020-09-03

Details

Check Text ( C-19566r377270_chk )
Run the following command to check the owner of the system audit logs:

grep "^log_file" /etc/audit/auditd.conf|sed s/^[^\/]*//|xargs stat -c %U:%n

Audit logs must be owned by root.
If they are not, this is a finding.
Fix Text (F-19564r377271_fix)
Change the owner of the audit log files with the following command:

# chown root [audit_file]