Check: GEN002718
Solaris 9 X86 STIG:
GEN002718
(in version v1 r9)
Title
System audit tool executables must not have extended ACLs. (Cat III impact)
Discussion
To prevent unauthorized access or manipulation of system audit logs, the tools for manipulating those logs must be protected.
Check Content
Check the permissions of audit tool executables. # ls -l /usr/sbin/auditd /usr/sbin/audit /usr/sbin/bsmrecord /usr/sbin/auditreduce /usr/sbin/praudit /usr/sbin/auditconfig If the permissions include a "+", the file has an extended ACL and this is a finding.
Fix Text
Remove the extended ACL from the file. # getfacl [audit file] Remove each ACE returned. # setfacl -d [ACE] [audit file]
Additional Identifiers
Rule ID: SV-26514r1_rule
Vulnerability ID: V-22373
Group Title:
Expert Comments
Expert comments are only available to logged-in users.
CCIs
CCIs tied to check.
Number | Definition |
---|---|
CCI-001493 |
The information system protects audit tools from unauthorized access. |
Controls
Controls tied to check. These are derived from the CCIs shown above.
Number | Title |
---|---|
AU-9 |
Protection Of Audit Information |