SV-239087r675069_rule
V-239087
SRG-OS-000057-GPOS-00027
PHTN-67-000015
CAT II
10
At the command line, execute the following command:
# chmod 0600 <audit log file>
Replace <audit log file> with the log files more permissive than 0600.
At the command line, execute the following command:
# (audit_log_file=$(grep "^log_file" /etc/audit/auditd.conf|sed s/^[^\/]*//) && if [ -f "${audit_log_file}" ] ; then printf "Log(s) found in "${audit_log_file%/*}":\n"; stat -c "%n permissions are %a" ${audit_log_file%}*; else printf "audit log file(s) not found\n"; fi)
If the permissions on any audit log file is more permissive than 0600, this is a finding.
V-239087
False
PHTN-67-000015
At the command line, execute the following command:
# (audit_log_file=$(grep "^log_file" /etc/audit/auditd.conf|sed s/^[^\/]*//) && if [ -f "${audit_log_file}" ] ; then printf "Log(s) found in "${audit_log_file%/*}":\n"; stat -c "%n permissions are %a" ${audit_log_file%}*; else printf "audit log file(s) not found\n"; fi)
If the permissions on any audit log file is more permissive than 0600, this is a finding.
M
5323