Check: GEN002710
      
      
        
  SUSE Linux Enterprise Server v11 for System z STIG:
  GEN002710
  
    (in versions v1 r12 through v1 r9)
  
      
      
    
  Title
All system audit files must not have extended ACLs. (Cat II impact)
Discussion
If a user can write to the audit logs, then audit trails can be modified or destroyed and system intrusion may not be detected.
Check Content
Check the system audit log files for extended ACLs. Procedure: # grep "^log_file" /etc/audit/auditd.conf|sed s/^[^\/]*//|xargs ls -l If the permissions include a '+', the file has an extended ACL. If the file has an extended ACL and it has not been documented with the IAO, this is a finding.
Fix Text
Remove the extended ACL from the system audit file(s). # setfacl --remove-all [audit file]
Additional Identifiers
Rule ID: SV-45211r1_rule
Vulnerability ID: V-22369
Group Title: GEN002710
Expert Comments
      Expert comments are only available to logged-in users.
    
  
  
      
        
        
      
      
        
  CCIs
      
      
        
        
      
    
  
    
  CCIs tied to check.
  
  
  | Number | Definition | 
|---|---|
| CCI-000163 | Protect audit information from unauthorized modification. | 
      
        
        
      
      
        
  Controls
      
      
        
        
      
    
  
    
  Controls tied to check. These are derived from the CCIs shown above.
  
  
  | Number | Title | 
|---|---|
| AU-9 | Protection of Audit Information |