UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The /etc/syslog.conf file must be group-owned by root, bin, or sys.


Overview

Finding ID Version Rule ID IA Controls Severity
V-4394 GEN005420 SV-39892r1_rule ECLP-1 Medium
Description
If the group owner of /etc/syslog.conf is not root, bin, or sys, unauthorized users could be permitted to view, edit, or delete important system messages handled by the syslog facility.
STIG Date
Solaris 9 X86 Security Technical Implementation Guide 2013-07-02

Details

Check Text ( C-38912r1_chk )
Check /etc/syslog.conf group ownership.

Procedure:
# ls -lL /etc/syslog.conf

If /etc/syslog.conf is not group-owned by root, sys, or bin, this is a finding.
Fix Text (F-34049r1_fix)
Change the group owner of the /etc/syslog.conf file to root, bin, or sys.

Procedure:
# chgrp root /etc/syslog.conf