SV-100149r1_rule
V-89499
SRG-OS-000059-GPOS-00029
VRAU-SL-000165
CAT II
10
Change the mode of the audit log file(s):
# chmod 0640 <audit log file>
Verify that the system audit logs with the following command:
# (audit_log_file=$(grep "^log_file" /etc/audit/auditd.conf|sed s/^[^\/]*//) && if [ -f "${audit_log_file}" ] ; then printf "Log(s) found in "${audit_log_file%/*}":\n"; ls -l ${audit_log_file%/*}; else printf "audit log file(s) not found\n"; fi)
If any audit log file has a mode more permissive than "0640", this is a finding.
V-89499
False
VRAU-SL-000165
Verify that the system audit logs with the following command:
# (audit_log_file=$(grep "^log_file" /etc/audit/auditd.conf|sed s/^[^\/]*//) && if [ -f "${audit_log_file}" ] ; then printf "Log(s) found in "${audit_log_file%/*}":\n"; ls -l ${audit_log_file%/*}; else printf "audit log file(s) not found\n"; fi)
If any audit log file has a mode more permissive than "0640", this is a finding.
M
3459