Check: GEN002710
SUSE Linux Enterprise Server v11 for System z STIG:
GEN002710
(in versions v1 r12 through v1 r9)
Title
All system audit files must not have extended ACLs. (Cat II impact)
Discussion
If a user can write to the audit logs, then audit trails can be modified or destroyed and system intrusion may not be detected.
Check Content
Check the system audit log files for extended ACLs. Procedure: # grep "^log_file" /etc/audit/auditd.conf|sed s/^[^\/]*//|xargs ls -l If the permissions include a '+', the file has an extended ACL. If the file has an extended ACL and it has not been documented with the IAO, this is a finding.
Fix Text
Remove the extended ACL from the system audit file(s). # setfacl --remove-all [audit file]
Additional Identifiers
Rule ID: SV-45211r1_rule
Vulnerability ID: V-22369
Group Title: GEN002710
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000163 |
The information system protects audit information from unauthorized modification. |
Controls
Number | Title |
---|---|
AU-9 |
Protection Of Audit Information |