The audit information produced by MarkLogic Server must be protected from unauthorized modification.
Overview
Finding ID | Version | Rule ID | IA Controls | Severity |
V-220350 | ML09-00-002000 | SV-220350r960933_rule | Medium |
Description |
STIG | Date |
MarkLogic Server v9 Security Technical Implementation Guide | 2024-09-04 |
Details
Check Text (C-22065r401501_chk) |
Review controls and permissions are sufficient to protect audit log files from unauthorized access at the operating-system level. Verify User ownership, Group ownership, and permissions on the "audit" file: > ls -al /var/opt/MarkLogic/Logs/AuditLog.txt If the User owner is not "daemon", this is a finding If the Group owner is not "daemon", this is a finding. If the directory is more permissive than 700, this is a finding. |
Fix Text (F-22054r401502_fix) |
Apply controls and modify permissions to protect audit log files from unauthorized access at the operating-system level. Change owner and group of /var/opt/MarkLogic/Logs to user daemon from the command line with a privileged user: > chown daemon.daemon /var/opt/MarkLogic/Logs Change permissions of /var/opt/MarkLogic/Logs to 700 (rwx by owner only) from the command line > chmod 700 /var/opt/MarkLogic/Logs |