Check: GEN001260
Title
System log files must have mode 0640 or less permissive. (Cat II impact)
Discussion
If the system log files are not protected, unauthorized users could change the logged data, eliminating its forensic value.
Check Content
Check the mode of log file hierarchies. Procedure: # find /var/log /var/adm -perm -640 ! -perm 640 -type f -exec ls -ld {} \; If any of the log files or their directories have modes more permissive than "0640", and these are not documented, this is a finding.
Fix Text
Change the mode of the system log file(s) to 0640 or less permissive. Procedure: # chmod "0640" /path/to/system-log-file NOTE: Do not confuse system log files with audit logs. Any subsystems that require less stringent permissions must be documented.
Additional Identifiers
Rule ID:
Vulnerability ID: V-787
Group Title:
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-001314 |
The information system reveals error messages only to organization-defined personnel or roles. |
Controls
Number | Title |
---|---|
SI-11 |
Error Handling |