Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-38495 | RHEL-06-000384 | SV-50296r1_rule | Medium |
Description |
---|
If non-privileged users can write to audit logs, audit trails can be modified or destroyed. |
STIG | Date |
---|---|
Red Hat Enterprise Linux 6 Security Technical Implementation Guide | 2018-11-28 |
Check Text ( C-46053r1_chk ) |
---|
Run the following command to check the owner of the system audit logs: grep "^log_file" /etc/audit/auditd.conf|sed s/^[^\/]*//|xargs stat -c %U:%n Audit logs must be owned by root. If they are not, this is a finding. |
Fix Text (F-43443r1_fix) |
---|
Change the owner of the audit log files with the following command: # chown root [audit_file] |