Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-22702 | GEN002690 | SV-27277r1_rule | ECLP-1 ECTP-1 | Medium |
Description |
---|
Sensitive system and user information could provide a malicious user with enough information to penetrate further into the system. |
STIG | Date |
---|---|
Solaris 9 X86 Security Technical Implementation Guide | 2013-07-02 |
Check Text ( C-28375r1_chk ) |
---|
Determine the location of audit logs and then check the group-ownership. Procedure: # more /etc/security/audit_control # ls -lLd If any audit log file is not group-owned by root, bin, or sys, this is a finding. |
Fix Text (F-24520r1_fix) |
---|
Change the group ownership of the audit log file(s). Procedure: # chgrp root |