Check: GEN002710
      
      
        
  Solaris 10 X86 STIG:
  GEN002710
  
    (in versions v2 r4 through v1 r17)
  
      
      
    
  Title
All system audit files must not have extended ACLs. (Cat II impact)
Discussion
If a user can write to the audit logs, then audit trails can be modified or destroyed and system intrusion may not be detected.
Check Content
Check the audit configuration to determine the location of the system audit log files. # more /etc/security/audit_control Check the system audit log files for extended ACLs. # ls -la [audit log dir] If the permissions include a "+", the file has an extended ACL and this is a finding.
Fix Text
Remove the extended ACL from the file. # chmod A- [audit file]
Additional Identifiers
Rule ID: SV-227719r603266_rule
Vulnerability ID: V-227719
Group Title: SRG-OS-000058
Expert Comments
      Expert comments are only available to logged-in users.
    
  
  
      
        
        
      
      
        
  CCIs
      
      
        
        
      
    
  
    
  CCIs tied to check.
  
  
  | Number | Definition | 
|---|---|
| CCI-000163 | 
           Protect audit information from unauthorized modification.  | 
      
      
        
        
      
      
        
  Controls
      
      
        
        
      
    
  
    
  Controls tied to check. These are derived from the CCIs shown above.
  
  
  | Number | Title | 
|---|---|
| AU-9 | 
           Protection of Audit Information  |