SV-219231r610963_rule
V-219231
SRG-OS-000059-GPOS-00029
UBTU-18-010308
CAT II
10
Configure the audit log directory to have a mode of "0750" or less permissive.
First determine where the audit logs are stored with the following command:
# sudo grep -iw log_file /etc/audit/auditd.conf
log_file = /var/log/audit/audit.log
Using the path of the directory containing the audit logs, configure the audit log directory to have a mode of "0750" or less permissive by using the following command:
# chmod -R g-w,o-rwx /var/log/audit
Verify that the audit log directory has a mode of "0750" or less permissive.
First determine where the audit logs are stored with the following command:
# sudo grep -iw log_file /etc/audit/auditd.conf
log_file = /var/log/audit/audit.log
Using the path of the directory containing the audit logs, check if the directory has a mode of "0750" or less by using the following command:
# sudo stat -c "%n %a" /var/log/audit
/var/log/audit 750
If the audit log directory has a mode more permissive than "0750", this is a finding.
V-219231
False
UBTU-18-010308
Verify that the audit log directory has a mode of "0750" or less permissive.
First determine where the audit logs are stored with the following command:
# sudo grep -iw log_file /etc/audit/auditd.conf
log_file = /var/log/audit/audit.log
Using the path of the directory containing the audit logs, check if the directory has a mode of "0750" or less by using the following command:
# sudo stat -c "%n %a" /var/log/audit
/var/log/audit 750
If the audit log directory has a mode more permissive than "0750", this is a finding.
M
4055