Check: AOSX-09-000338
Apple OS X 10.9 Workstation STIG:
AOSX-09-000338
(in version v1 r2)
Title
Log folders must not contain ACLs. (Cat II impact)
Discussion
The audit service must be configured to create log folders with the correct permissions to prevent normal users from reading audit logs. Audit logs contain sensitive data about the system and about users. If log folders are set to only be readable and writable by root or administrative users with sudo, the risk is mitigated.
Check Content
To check if a log folder contains ACLs, run the following commands: sudo ls -lde $(sudo grep '^dir' /etc/security/audit_control | awk -F: '{print $2}') In the output from the above commands, ACLs will be listed under any folder that may contain them (e.g., '0: group:admin allow list,readattr,reaadextattr,readsecurity'). If any such line exists, this is a finding.
Fix Text
For any log folder that contains ACLs, run the following command: sudo chmod -N [audit log folder]
Additional Identifiers
Rule ID: SV-73329r1_rule
Vulnerability ID: V-58899
Group Title:
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000164 |
The information system protects audit information from unauthorized deletion. |
Controls
Number | Title |
---|---|
AU-9 |
Protection Of Audit Information |