STIGQter STIGQter: STIG Summary: VMware vSphere 6.7 Photon OS Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 09 Mar 2021:

The Photon operating system audit log must be owned by root.

DISA Rule

SV-239088r675072_rule

Vulnerability Number

V-239088

Group Title

SRG-OS-000058-GPOS-00028

Rule Version

PHTN-67-000016

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

At the command line, execute the following command:

# chown root:root <audit log file>

Replace <audit log file> with the log files not owned by root.

Check Contents

At the command line, execute the following command:

# (audit_log_file=$(grep "^log_file" /etc/audit/auditd.conf|sed s/^[^\/]*//) && if [ -f "${audit_log_file}" ] ; then printf "Log(s) found in "${audit_log_file%/*}":\n"; stat -c "%n is owned by %U" ${audit_log_file%}*; else printf "audit log file(s) not found\n"; fi)

If any audit log file is not owned by root, this is a finding.

Vulnerability Number

V-239088

Documentable

False

Rule Version

PHTN-67-000016

Severity Override Guidance

At the command line, execute the following command:

# (audit_log_file=$(grep "^log_file" /etc/audit/auditd.conf|sed s/^[^\/]*//) && if [ -f "${audit_log_file}" ] ; then printf "Log(s) found in "${audit_log_file%/*}":\n"; stat -c "%n is owned by %U" ${audit_log_file%}*; else printf "audit log file(s) not found\n"; fi)

If any audit log file is not owned by root, this is a finding.

Check Content Reference

M

Target Key

5323

Comments