UCF STIG Viewer Logo

System audit logs must be owned by root.


Overview

Finding ID Version Rule ID IA Controls Severity
V-812 GEN002680 SV-812r2_rule ECTP-1 Medium
Description
Failure to give ownership of system audit log files to root provides the designated owner and unauthorized users with the potential to access sensitive information.
STIG Date
UNIX SRG 2013-03-26

Details

Check Text ( C-554r2_chk )
Check the ownership of the audit log file(s).
# ls -l
If any audit log file is not owned by root, this is a finding.
Fix Text (F-966r2_fix)
Change the ownership of the audit log file(s).

Procedure:
# chown root