Check: RHEL-06-000135
Red Hat Enterprise Linux 6 STIG:
RHEL-06-000135
(in versions v2 r2 through v1 r14)
Title
All rsyslog-generated log files must have mode 0600 or less permissive. (Cat II impact)
Discussion
Log files can contain valuable information regarding system configuration. If the system log files are not protected, unauthorized users could change the logged data, eliminating their forensic value.
Check Content
The file permissions for all log files written by rsyslog should be set to 600, or more restrictive. These log files are determined by the second part of each Rule line in "/etc/rsyslog.conf" and typically all appear in "/var/log". For each log file [LOGFILE] referenced in "/etc/rsyslog.conf", run the following command to inspect the file's permissions: $ ls -l [LOGFILE] The permissions should be 600, or more restrictive. Some log files referenced in /etc/rsyslog.conf may be created by other programs and may require exclusion from consideration. If the permissions are not correct, this is a finding.
Fix Text
The file permissions for all log files written by rsyslog should be set to 600, or more restrictive. These log files are determined by the second part of each Rule line in "/etc/rsyslog.conf" and typically all appear in "/var/log". For each log file [LOGFILE] referenced in "/etc/rsyslog.conf", run the following command to inspect the file's permissions: $ ls -l [LOGFILE] If the permissions are not 600 or more restrictive, run the following command to correct this: # chmod 0600 [LOGFILE]
Additional Identifiers
Rule ID: SV-217940r603264_rule
Vulnerability ID: V-217940
Group Title: SRG-OS-000206
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-001314 |
Reveal error messages only to organization-defined personnel or roles. |
Controls
Number | Title |
---|---|
SI-11 |
Error Handling |