UCF STIG Viewer Logo

Audit log directories must have mode 0755 or less permissive.


Overview

Finding ID Version Rule ID IA Controls Severity
V-38493 RHEL-06-000385 SV-50294r1_rule Medium
Description
If users can delete audit logs, audit trails can be modified or destroyed.
STIG Date
Red Hat Enterprise Linux 6 Security Technical Implementation Guide 2015-05-26

Details

Check Text ( C-46050r1_chk )
Run the following command to check the mode of the system audit directories:

grep "^log_file" /etc/audit/auditd.conf|sed 's/^[^/]*//; s/[^/]*$//'|xargs stat -c %a:%n

Audit directories must be mode 0755 or less permissive.
If any are more permissive, this is a finding.
Fix Text (F-43440r1_fix)
Change the mode of the audit log directories with the following command:

# chmod go-w [audit_directory]