Check: RHEL-06-000384
      
      
        
  Red Hat Enterprise Linux 6 STIG:
  RHEL-06-000384
  
    (in versions v2 r2 through v1 r14)
  
      
      
    
  Title
Audit log files must be owned by root. (Cat II impact)
Discussion
If non-privileged users can write to audit logs, audit trails can be modified or destroyed.
Check Content
Run the following command to check the owner of the system audit logs: grep "^log_file" /etc/audit/auditd.conf|sed s/^[^\/]*//|xargs stat -c %U:%n Audit logs must be owned by root. If they are not, this is a finding.
Fix Text
Change the owner of the audit log files with the following command: # chown root [audit_file]
Additional Identifiers
Rule ID: SV-218085r603264_rule
Vulnerability ID: V-218085
Group Title: SRG-OS-000057
Expert Comments
      Expert comments are only available to logged-in users.
    
  
  
      
        
        
      
      
        
  CCIs
      
      
        
        
      
    
  
    
  CCIs tied to check.
  
  
  | Number | Definition | 
|---|---|
| CCI-000162 | Protect audit information from unauthorized access. | 
      
        
        
      
      
        
  Controls
      
      
        
        
      
    
  
    
  Controls tied to check. These are derived from the CCIs shown above.
  
  
  | Number | Title | 
|---|---|
| AU-9 | Protection of Audit Information |