Xylok Security Suite must protect audit information from any type of unauthorized access.

Overview

Finding IDVersionRule IDIA ControlsSeverity
V-269576XYLK-20-000043SV-269576r1053503_ruleCCI-000162medium
Description
If audit data were to become compromised, then competent forensic analysis and discovery of the true source of potentially malicious system activity is difficult if not impossible to achieve. In addition, access to audit records provides information an attacker could potentially use to their advantage. To ensure the veracity of audit data, the information system and/or the Xylok Security Suite must protect audit information from any and all unauthorized access. This includes read, write, and copy access. Satisfies: SRG-APP-000118, SRG-APP-000119, SRG-APP-000120, SRG-APP-000121, SRG-APP-000122, SRG-APP-000123
STIGDate
Xylok Security Suite 20.x Security Technical Implementation Guide2024-12-13

Details

Check Text (C-269576r1053503_chk)

Check the Xylok log file directory permissions with the following command: $ ls -l /var/log/xylok If any of the directories have permissions greater than "0770", this is a finding.

Fix Text (F-73510r1053502_fix)

As root, remove all global permissions for Xylok's log files by running: # chmod -R 0770 /var/log/xylok/