Check: GEN002710
Solaris 10 SPARC STIG:
GEN002710
(in versions v2 r4 through v1 r19)
Title
All system audit files must not have extended ACLs. (Cat II impact)
Discussion
If a user can write to the audit logs, then audit trails can be modified or destroyed and system intrusion may not be detected.
Check Content
Check the audit configuration to determine the location of the system audit log files. # more /etc/security/audit_control Check the system audit log files for extended ACLs. # ls -la [audit log dir] If the permissions include a "+", the file has an extended ACL and this is a finding.
Fix Text
Remove the extended ACL from the file. # chmod A- [audit file]
Additional Identifiers
Rule ID: SV-226593r603265_rule
Vulnerability ID: V-226593
Group Title: SRG-OS-000058
Expert Comments
Expert comments are only available to logged-in users.
CCIs
CCIs tied to check.
Number | Definition |
---|---|
CCI-000163 |
The information system protects audit information from unauthorized modification. |
Controls
Controls tied to check. These are derived from the CCIs shown above.
Number | Title |
---|---|
AU-9 |
Protection Of Audit Information |