Check: GEN002710
Solaris 9 X86 STIG:
GEN002710
(in version v1 r9)
Title
All system audit files must not have extended ACLs. (Cat II impact)
Discussion
If a user can write to the audit logs, then audit trails can be modified or destroyed and system intrusion may not be detected.
Check Content
Check the audit configuration to determine the location of the system audit log files. # more /etc/security/audit_control Check the system audit log files for extended ACLs. # ls -la [audit log dir] If the permissions include a "+", the file has an extended ACL and this is a finding.
Fix Text
Remove the extended ACL from the file. # getfacl [audit file] Remove each ACE returned. # setfacl -d [ACE] [audit file]
Additional Identifiers
Rule ID: SV-26501r1_rule
Vulnerability ID: V-22369
Group Title:
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000163 |
The information system protects audit information from unauthorized modification. |
Controls
Number | Title |
---|---|
AU-9 |
Protection Of Audit Information |