Check: GEN005400
SUSE Linux Enterprise Server v11 for System z STIG:
GEN005400
(in versions v1 r12 through v1 r9)
Title
The /etc/rsyslog.conf file must be owned by root. (Cat II impact)
Discussion
If the /etc/syslog.conf file is not owned by root, unauthorized users could be allowed to view, edit, or delete important system messages handled by the syslog facility.
Check Content
Check /etc/rsyslog.conf ownership: # ls –lL /etc/rsyslog* If any rsyslog configuration file is not owned by root, this is a finding.
Fix Text
Use the chown command to set the owner to root. # chown root <rsyslog configuration file>
Additional Identifiers
Rule ID: SV-45976r1_rule
Vulnerability ID: V-4393
Group Title: GEN005400
Expert Comments
Expert comments are only available to logged-in users.
CCIs
CCIs tied to check.
Number | Definition |
---|---|
CCI-000225 |
Employ the principle of least privilege, allowing only authorized accesses for users (or processes acting on behalf of users) which are necessary to accomplish assigned organizational tasks. |
Controls
Controls tied to check. These are derived from the CCIs shown above.
Number | Title |
---|---|
AC-6 |
Least Privilege |