UCF STIG Viewer Logo

System audit logs must be owned by root.


Overview

Finding ID Version Rule ID IA Controls Severity
V-812 GEN002680 SV-27271r1_rule ECTP-1 Medium
Description
Failure to give ownership of system audit log files to root provides the designated owner and unauthorized users with the potential to access sensitive information.
STIG Date
Solaris 9 SPARC Security Technical Implementation Guide 2013-11-04

Details

Check Text ( None )
None
Fix Text (F-966r2_fix)
Change the ownership of the audit log file(s).

Procedure:
# chown root