UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The Photon operating system audit files and directories must have correct permissions.


Overview

Finding ID Version Rule ID IA Controls Severity
V-239121 PHTN-67-000050 SV-239121r675171_rule Medium
Description
Protecting audit information also includes identifying and protecting the tools used to view and manipulate log data. Therefore, protecting audit tools is necessary to prevent unauthorized operations on audit information.
STIG Date
VMware vSphere 6.7 Photon OS Security Technical Implementation Guide 2022-01-03

Details

Check Text ( C-42332r675169_chk )
At the command line, execute the following command:

# stat -c "%n is owned by %U and group owned by %G" /usr/sbin/auditctl /usr/sbin/auditd /usr/sbin/aureport /usr/sbin/ausearch /usr/sbin/autrace

If any file is not owned by root and group owned by root, this is a finding.
Fix Text (F-42291r675170_fix)
At the command line, execute the following command for each file returned:

# chown root:root