UCF STIG Viewer Logo

Audit log files must be owned by root.


Overview

Finding ID Version Rule ID IA Controls Severity
V-38495 RHEL-06-000384 SV-50296r1_rule Medium
Description
If non-privileged users can write to audit logs, audit trails can be modified or destroyed.
STIG Date
Red Hat Enterprise Linux 6 Security Technical Implementation Guide 2015-09-09

Details

Check Text ( None )
None
Fix Text (F-43443r1_fix)
Change the owner of the audit log files with the following command:

# chown root [audit_file]