SV-238245r653910_rule
V-238245
SRG-OS-000057-GPOS-00027
UBTU-20-010122
CAT II
10
Configure the audit log files to have a mode of "0600" or less permissive.
Determine where the audit logs are stored with the following command:
$ sudo grep -iw log_file /etc/audit/auditd.conf
log_file = /var/log/audit/audit.log
Using the path of the directory containing the audit logs, configure the audit log files to have a mode of "0600" or less permissive by using the following command:
$ sudo chmod 0600 /var/log/audit/*
Verify that the audit log files have a mode of "0600" or less permissive.
Determine where the audit logs are stored with the following command:
$ sudo grep -iw log_file /etc/audit/auditd.conf
log_file = /var/log/audit/audit.log
Using the path of the directory containing the audit logs, determine if the audit log files have a mode of "0600" or less by using the following command:
$ sudo stat -c "%n %a" /var/log/audit/*
/var/log/audit/audit.log 600
If the audit log files have a mode more permissive than "0600", this is a finding.
V-238245
False
UBTU-20-010122
Verify that the audit log files have a mode of "0600" or less permissive.
Determine where the audit logs are stored with the following command:
$ sudo grep -iw log_file /etc/audit/auditd.conf
log_file = /var/log/audit/audit.log
Using the path of the directory containing the audit logs, determine if the audit log files have a mode of "0600" or less by using the following command:
$ sudo stat -c "%n %a" /var/log/audit/*
/var/log/audit/audit.log 600
If the audit log files have a mode more permissive than "0600", this is a finding.
M
5318