UCF STIG Viewer Logo

Audit log files must have mode 0640 or less permissive.


Overview

Finding ID Version Rule ID IA Controls Severity
V-38498 RHEL-06-000383 SV-50299r1_rule Medium
Description
If users can write to audit logs, audit trails can be modified or destroyed.
STIG Date
Red Hat Enterprise Linux 6 Security Technical Implementation Guide 2015-05-26

Details

Check Text ( C-46055r1_chk )
Run the following command to check the mode of the system audit logs:

grep "^log_file" /etc/audit/auditd.conf|sed s/^[^\/]*//|xargs stat -c %a:%n

Audit logs must be mode 0640 or less permissive.
If any are more permissive, this is a finding.
Fix Text (F-43445r1_fix)
Change the mode of the audit log files with the following command:

# chmod 0640 [audit_file]