Check: GEN005395
SUSE Linux Enterprise Server v11 for System z STIG:
GEN005395
(in versions v1 r12 through v1 r9)
Title
The /etc/syslog.conf file must not have an extended ACL. (Cat II impact)
Discussion
Unauthorized users must not be allowed to access or modify the /etc/syslog.conf file.
Check Content
Check the permissions of the syslog configuration file. # ls -lL /etc/rsyslog.conf /etc/rsyslog.d/ If the permissions include a '+', the file has an extended ACL. If the file has an extended ACL and it has not been documented with the IAO, this is a finding.
Fix Text
Remove the extended ACL from the file. # setfacl --remove-all <syslog configuration file>
Additional Identifiers
Rule ID: SV-45974r1_rule
Vulnerability ID: V-22454
Group Title: GEN005395
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000225 |
Employ the principle of least privilege, allowing only authorized accesses for users (or processes acting on behalf of users) which are necessary to accomplish assigned organizational tasks. |
Controls
Number | Title |
---|---|
AC-6 |
Least Privilege |