SV-230396r627750_rule
V-230396
SRG-OS-000057-GPOS-00027
RHEL-08-030070
CAT II
10
Configure the audit log to be protected from unauthorized read access by configuring the log group in the /etc/audit/auditd.conf file:
log_group = root
Verify the audit logs have a mode of "0600" or less permissive.
First, determine where the audit logs are stored with the following command:
$ sudo grep -iw log_file /etc/audit/auditd.conf
log_file = /var/log/audit/audit.log
Using the location of the audit log file, check if the audit log has a mode of "0600" or less permissive with the following command:
$ sudo stat -c "%a %n" /var/log/audit/audit.log
600 /var/log/audit/audit.log
If the audit log has a mode more permissive than "0600", this is a finding.
V-230396
False
RHEL-08-030070
Verify the audit logs have a mode of "0600" or less permissive.
First, determine where the audit logs are stored with the following command:
$ sudo grep -iw log_file /etc/audit/auditd.conf
log_file = /var/log/audit/audit.log
Using the location of the audit log file, check if the audit log has a mode of "0600" or less permissive with the following command:
$ sudo stat -c "%a %n" /var/log/audit/audit.log
600 /var/log/audit/audit.log
If the audit log has a mode more permissive than "0600", this is a finding.
M
2921