Check: GEN002715
Solaris 10 X86 STIG:
GEN002715
(in versions v2 r4 through v1 r17)
Title
System audit tool executables must be owned by root. (Cat III impact)
Discussion
To prevent unauthorized access or manipulation of system audit logs, the tools for manipulating those logs must be protected.
Check Content
Verify the audit tool executables are owned by root. # ls -l /usr/sbin/auditd /usr/sbin/audit /usr/sbin/bsmrecord /usr/sbin/auditreduce /usr/sbin/praudit /usr/sbin/auditconfig If any listed file is not owned by root, this is a finding.
Fix Text
Change the owner of the audit tool executable to root. # chown root [audit tool executable]
Additional Identifiers
Rule ID: SV-227720r603266_rule
Vulnerability ID: V-227720
Group Title: SRG-OS-000256
Expert Comments
Expert comments are only available to logged-in users.
CCIs
CCIs tied to check.
Number | Definition |
---|---|
CCI-001493 |
The information system protects audit tools from unauthorized access. |
Controls
Controls tied to check. These are derived from the CCIs shown above.
Number | Title |
---|---|
AU-9 |
Protection Of Audit Information |