SV-100147r1_rule
V-89497
SRG-OS-000058-GPOS-00028
VRAU-SL-000160
CAT II
10
Change the mode of the audit log file(s):
# chmod 0640 <audit log file>
Verify that the system audit logs with the following command:
# (audit_log_file=$(grep "^log_file" /etc/audit/auditd.conf|sed s/^[^\/]*//) && if [ -f "${audit_log_file}" ] ; then printf "Log(s) found in "${audit_log_file%/*}":\n"; ls -l ${audit_log_file%/*}; else printf "audit log file(s) not found\n"; fi)
If any audit log file has a mode more permissive than "0640", this is a finding.
V-89497
False
VRAU-SL-000160
Verify that the system audit logs with the following command:
# (audit_log_file=$(grep "^log_file" /etc/audit/auditd.conf|sed s/^[^\/]*//) && if [ -f "${audit_log_file}" ] ; then printf "Log(s) found in "${audit_log_file%/*}":\n"; ls -l ${audit_log_file%/*}; else printf "audit log file(s) not found\n"; fi)
If any audit log file has a mode more permissive than "0640", this is a finding.
M
3459